&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000010001fff000000000000000000600000", @ANYRES32=r2, @ANYBLOB="00000400ceb70000180012800e000100776972655834617264008100f6000280530f6e3b6d3e31ad7e318fb879969b80a2749b02d21648bedd058ad87fce5c175a5e4b613ba9668f774aea42600ffd6f110ed6dc94af1d753dd4b183e5c67c8da6d0d111a25c912f0417e30ba7ab658033e765ef3c6efd152d5aa5a27dc058313883436a333ff1e3581a7034361d7441d70cc143005dfd2b3db7f8b1631a0ed7fc585b113c82d4d6aae6e8de6b399d9a2e19500e0f6c59c08e148c347a"], 0x38}}, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x800000080004103) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x9c, 0x0, 0x1, 0x5, 0x0, 0x0, {0xc, 0x0, 0x8}, [@CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0x755, 0x3]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xff800000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xffffffc1}, @CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8}]}, @CTA_TUPLE_REPLY={0x50, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private0}}}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 02:58:14 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = dup2(r0, 0xffffffffffffffff) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x121002, 0x1c1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, 0xffffffffffffffff, 0x0, 0x800000080004103) 02:58:14 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f0000000740)=ANY=[], 0x191) close(r5) sendmsg$IPCTNL_MSG_CT_GET_STATS(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x5, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010003904000000000000000000000000a02377cf98fc51ff3eda477f1c22b3bb1c9f15af2c7940716a49389cf60aa47f87eda9178de8a5891e5056", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100736974001400028008000400", @ANYRES32=r6, @ANYBLOB="05000500"], 0x40}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r5, 0x89f4, &(0x7f0000001d40)={'ip6gre0\x00', &(0x7f0000001cc0)={'sit0\x00', r6, 0x2f, 0x0, 0xff, 0x21a0, 0x4, @mcast1, @mcast2, 0x8, 0x7, 0x4, 0xffffffff}}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x10280}}, 0x20}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0xfffffe35, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x1894b}}, 0x20}}, 0x0) sendmmsg$inet(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="a91ccb64a5be08238d6b4fe4e6b4193e58c5090cec5b7cc9ad6191b1d4fa35915a7466e5781d03a9a303d2fd22c628cf520cd76aaba36db90c304e11514eafbe6d896533", 0x44}, {&(0x7f00000001c0)="d3c0acc6e644a0590302996ec205a7b60b392749c165e8dc10cd996702d704c06b11291c5067aa3f2a0162ed10ac2cfec7bbfa37642148fa0e1aa3b4fcbc8e391cf581fe26764b9ea898c978478ab2f6019823555459d9e97090536c5f99183867a6ecf930a8058cbf32c699f30062b090bbb336871e990511c144ce007338f4255ea951b65086e3fef8526a45715a9da27b0791b252a20e628b7d365892986ebc76d79c0a424942fc678ddc23d192db0b01f9508293de8987bbbae275d29684eefc5503a0cde6419202b8c4bdc0fdf71bcf11a56897195647917d656ba964bb4410b00f270d5a23f258c4300bb5f2c3ab6034f487d9", 0xf6}, {&(0x7f00000002c0)="9e6382c98b68dd9aaf7c4992c45dc9a9d1a06bae1ab413e7eef308c5759fc274f3c9005d0f632f4a7b5cb60f835625eb45c240e1d069511534d058dc09b205ed39e754414fa010c2ea725187293193b89bd81b17b6758845ddd3c806b32aa50ec6df94de5de38633872d715fceccc453d56672d0d99330b427b97d6ae74b3c82349f3c075a3e5b0c563bdeddd718300311c0a2f8f55832538dd9a46c9929b1b7e8b25d67c803b20b57ad34b854f17646cc39d1c7bc3ae09173c4a2a15e05d0c688fdca0e589e361ec6540c178d43a82c7ba3b4eb20a9ab6fc00ba88e", 0xdc}], 0x3, &(0x7f00000003c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_retopts={{0x94, 0x0, 0x7, {[@generic={0x94, 0x9, "8c691c248be150"}, @generic={0x44, 0xa, "14f964ebdb0de9d8"}, @timestamp_prespec={0x44, 0x34, 0xbc, 0x3, 0x0, [{@multicast1, 0x9}, {@local, 0x1}, {@private=0xa010100, 0x5}, {@multicast1, 0x9}, {@local, 0x9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @generic={0x0, 0xe, "07cd7ba3318257fa105100e5"}, @lsrr={0x83, 0x1b, 0xe1, [@empty, @broadcast, @remote, @empty, @loopback, @private=0xa010102]}, @cipso={0x86, 0x13, 0x0, [{0x46e086a796aa355c, 0x4, "13ee"}, {0x5, 0x9, "dc91ed3c6849d4"}]}, @end]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}], 0xe0}}, {{&(0x7f00000004c0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000500)="c5bd5f872f7427d48bff1bb837d2498061f9e81abf054a2eac018e913e61079939986be0f4a1877d6cf54aa6ebc4038d21f1cb70082ef1d1fcdc2bb192556a704aa3282315ce091912c2f81452abf17778d5abf902546b2a6edb91ca71c218e7537c1e7abfaad16852e3c8c4071161f2c7fede7cb4757194b5e02445761b76fecae6b8d048d58ade5dd59f5b61aba52b8a59c50e643da7b2f8a67008cfd76f98a068805174cf", 0xa6}, {&(0x7f00000005c0)="341be52eab404490b75cacc27f73290d8ea705a80e20bb7cdadc69c2570a993ccb48009f82c0a1adaf27ac0294373df9682fac68812172a893b1feb55e691d11e0732c6c9622532d1e39b226af3212362113971a14af253963ff89441aef885715c831ba8ac224c1dd73d4107451fb9c92b2465e469928153f57cba1f28c78a00cd05a5691366e0b0972fe11a9c940fad6dc95e26df8a3ca294b09cc14852dafdab343e195662b1343988055685be2be7e5b22c50994a3d4e09eaf", 0xbb}, {&(0x7f0000000680)="195e27308341b78f51b81b39585b501d950af342ce95cd995fbdd6577db2d23bc5a1cd6e68eda29719b3b507617cb8959586eb444c5386b9366529be78fe861bd1f12008d09539f3942481b96eac0486161336f930df93971c517990c61b5de4d1ba747b3ac1ecf691a1b69ec3f74bb13e6bb0eb61a212475da6be1d4984a3e77515e8e1bf8a84bb1f48964c3c2b9209762c9dea2c14ecf6cefae71d0ec51cc83ae0b1c44519720fc0773949", 0xac}, {&(0x7f0000000740)="0d280cfaeaa120bbccc331b9cc201d5966f5b5a938be7406edcecbafc56aba614d5c6876547b37e77f73d755de0cfd54860e4bdfeb030b21521a52b35da40ee31b13ccb001846a2d3c2ce872cac8f57d3ce7e1da3693f50e8af59dbdfa5db4f73c", 0x61}, {&(0x7f00000007c0)="b96fe54951c8ea24fc2ef9e2ce898a559a2d92995bbb5088475faba4a338a1cc7e00bd5813e1bddbd81c3086d2a7577f0096f845fd320b1123c0cc6ab089ad83eb7993ad20471042fb79187d6dd8fadcfb004140855e1b30f6443b8df29ab1dfbaf15638ebc0785987e79881290e130b0b4d0d483ed1b66ccd81872c56df1b85f1b196f91c5b88c9e7c00c681ec5aa488319d8543086855793df8d3846d6c887b76c543a2e8b9b53a20b14eefa4af355fa8a24e15c7a735866cfb55496605ee556a13f967896617cad7ac9247f5f3ddca3c111593bad91110805bb2f66bc2f5e770618bb468b7e523da1bffe", 0xec}], 0x5, &(0x7f0000000940)=[@ip_ttl={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@ra={0x94, 0x4}, @end, @timestamp_addr={0x44, 0x1c, 0x38, 0x1, 0xf, [{@multicast1}, {@rand_addr=0x64010102, 0x1}, {@broadcast, 0xd4e}]}, @noop, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x14, 0xd1, 0x3, 0xe, [{@remote, 0x20}, {@empty, 0x7ff}]}, @rr={0x7, 0x13, 0x5c, [@multicast2, @multicast1, @multicast1, @loopback]}]}}}, @ip_retopts={{0xc8, 0x0, 0x7, {[@end, @lsrr={0x83, 0x7, 0xda, [@empty]}, @timestamp_prespec={0x44, 0x24, 0xd3, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@loopback, 0xe1}, {@loopback, 0x6}, {@loopback, 0x1}]}, @ssrr={0x89, 0x1f, 0x62, [@local, @empty, @rand_addr=0x64010101, @private=0xa010102, @local, @multicast2, @remote]}, @timestamp={0x44, 0x2c, 0x3b, 0x0, 0xb, [0xed, 0x0, 0xffffffff, 0xc9c, 0x3, 0x200, 0x3, 0x9, 0x2, 0x10001]}, @lsrr={0x83, 0x1f, 0xf9, [@local, @private=0xa010102, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @multicast1]}, @ssrr={0x89, 0x1f, 0xa1, [@dev={0xac, 0x14, 0x14, 0x24}, @loopback, @local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @local]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @loopback}}}], 0x190}}, {{&(0x7f0000000b00)={0x2, 0x4e22, @private=0xa010102}, 0x10, &(0x7f0000002f00)=[{&(0x7f0000000b40)="943998bf9ecc666a3c2a2995efca7dd1594cbab0f461e6200500a6cf0f794e9ceb8a72d56f30fbee50a5d2f989b51e35b135b92caacbeb9ee9330bd19f83d8ba4f11326b780df8a5b9a231ce8bb2f65a593c300cbbe0053419b1430a4529ca21af1b80d44072072dc4e6db3df57005122917c97be5313af1", 0x78}, {&(0x7f0000000bc0)="563e8b146ec6412b9844f37f41e10cde8eae8d278ead06685a32ce255ff8cba7b3161167d3230ffe171ace689d5be4d35564db1da631b8c9049b14d853922b135dbe", 0x42}, {&(0x7f0000000c40)="28677dfcdab5f77b76d9332d21a0bbb6244fc81a00cc1f5184b1e57923e115e3009e63026c32e5d0e8a8dfd15bc7dec95c992599edde8bf020250ccbb67a19aa56b637e73888447a4f072ee0bd44216c4f585c601f05b7e305c7674f7a8c5b9145891d0ec3497147b62983cdf465d57c2077f302fb22d2c18fdd8ea40c3377ed042ab8c9dd88d219d00b32e534e91e2f848524aa38b5b8897393427403fd5f9f71d18ec474db28adc80703e180c4e4cec1de3231cf98ca66018c647f386a54d01bcc15117b0a87c1dcc66883337fc2a83459c05d94e96ce2ed507d608fc3abd6cc1f1169a576919eb8429876f65029012ae93b6412fa85063bc723d78ef57d0819cd82754ddcb9b9798de1d5896c38d681fb0229f802bdaf297e0169c2cfc089d8a8b90f89f470b1caac2da33eebf036e7cdc6db707f69e947c4996288314342fdffd6541ba031208be7820f1ab1da5ca8f354103bf3edc372cf97bd936eac41cead29cb096a71ae81f36df627bbcdfc88d4cdbb12d723edd5897aee65e3842729e1eb3e6d58696996ba5f15341a3aedb40ffd56c548d6be8f52f61ae39361b3691c44c2779e1ff4b39d29323e81cfb8eb2c8183255afc2dad6fd6135bce61d05933b3a161ca871b0cd385ee3556a00506d5f8c0dd67a970f5e89707070c3a12b966c4386b8d8e25851f1e0812861e0512fc2ccc4aababaa50fc4ddd9fc072d81cabbd7cd719274aec160518479308a720e24968a688cdf593bbe420609ddbff18ad94471d78439fbb080daff7ea5e6d8f4003ecdeaf54687d725f44b4a6be1345e5e5e0aad81dc5cd1b19fe3ea6d874fbc7037168f4f3c44c9f45418e182602c426f02ec5326e649ca5fdb85e4e25d09097c82a9829bcf560666d91d83d9fcd9bebd639eef8a80c95b55ad5b544ade0c04e7bd91df8498a8fa28516904ec491a4ebf636de09c325c6be33b35f0400b00bc67d64c82f8225bc1beda4be9a121442093a44cd97a2b357303ccb79314b82484c36afc4348c16f89b789222ac44a530be9ed649af81797c27ceccf1263cbf98dd11fdee231602b9c794220672258fd6a1c1a0a8725874b253decea2848f33b64edc8d15a18029d651963d839b64247335f4c5732e49aabbfc3f18a023460f58d80a2930895b31ef38689d73a2c12a8ca0aaa963704d0dab15e85595dea7e9fd814af7db2fde588cf0f2a7f4bbaff1427d3d514d21ad6d512e75cfaec7efa8fec64fe93183e198e39e0ebf881ed7fd794aa7511e09da87a18d09ab7cc873869b61c746b958e1efd02f18e307f986aae096a297794e18d57112b1a0c76aab6c84f8fb3229cccd36f55d7cc6220b46cf5e359187ce39dd03182911145f8b979be810c44c1cf084773cd21fa1aefe597464338ba3072d9e22d057b0adac5c9af8b42d15641f1f6e11cc7242b26052d9a5dcdc9f889b0d18ca9fe3fad3a4d52a11bc5825e6fba4a005e388673a9c0355e8676af03e589cbd8dfc5c3fcb9424a16af96bf6d12c1c9e3f9253044725da35ff761d1076b6beafe0510e417b2491a8d426b86df4540f1b9d09f9f2881607b6c495bbfe2111027acb6f91093a3bfc63d0d48be6e3d91b174129364ed56d89c60755920d6d6275229da0f14d05aae68b673e7d378600737257f901d2be523bdcb96c8041711fd61dae0be92d568adf6e8172e4080b8c6d126474b75340b8ed6d6f937526c064983069dbf216da1447dcd667265f29b08b2e3d6a85bae952ff593286be4ab344c4fc1a2d97a8d5e65bde19c3df0ca89b50b82dc4566d40fb71ed3ee4aa64f36ee24534cfff26a1b76103e56b5a4067b81e33d4e58d87b96db6e96d1af69cf27e9d57f8361f54e06be8859d359d1ab472e4b3b52875ef6278d9c9d22998423f80ae951b67611ff56d619acddc871aff99ccc068a8e53147ed49217f75e8591667ad83cdf1e7c7950da63b6d13724814c3922b511c05cf8cd69f21d606c850591223c6d23d684feef8b3991fdf60bb3df7bda611d5088ec1a86b111808e9279bf64e801d6de256679cfa24d93bb6781da1fd2faa9ffe9121123ad1b0ffaf35562d39da6493ea860107a8966b36e25e574445301408eab29ff9ec4556210f777e328b13d0cb733137b2c585f4934e05030b25b4cc49457bb0ce6c06bfb0657686f7b425293f76f635aaa6de7236dfdd8dc03b183a924bc549adfd31611afce10fa196214cfef6a1e7440551d27ddf43b9e2021594ca56c102dec45de9d0c04122e21006840dd8229cbe12d17dff3ffc615eefbf628ea9138047470677aa7c10b60cb196604ca2b8d51d185bddd79bcf54bb08b3665658216498628ea3d803b0a0b0801f28ae5cd064b1770a1a42fc997d76b162592542b074c92eb2103df0d671fba69df7201784b252513f38d176dd7baa11ec89175f6b6d6f53beba9439d88a1f1cc99e3ca838cc1e750aa53ce6930e72447b039be1bff38bceafebfd4350c0cc66e2d00555f05c85855384d3599578f2a4e20dd19e3284728e7ff174d5bf24da29d4bfb6779b068f3cee78a3b97002f309199ae193b6af23171671e75ca04125f0a5f42da926da908ad398887a26929bcfd48bd1b9e0f3e69e37d890c792877ddf1d422c722ba75ebdde20c9dd69dc739a3dcbdb7b181d0dac50b62864326b43a3248e61b54bcae14b2d71d1ebe4c9d440867bedd35b268b078576d4748d4df21200ea86aa398d4c1effc440f3b822856436489d9dbe493d7a4934b3843b1a2b0cccc9ba45371ed564fc8f9857ef6f3ebc0f46dd515f71fc74d1b5202a8c45292ddede71def47813aac1d12cdd4d9b1c4b6de5a30b350e6c404c116e8d40a5313816b96cead0b8a625ed8f4bb981477d7378b8d9931699c7979e5b6dfaf48cc772c24ff02805cf7e9768baa8edf2612209d373bd4799ad4161edee27d80f9d3cce6eac846794bd58b9834c5446b4e4875605addedf481fc6d5e0f5a700f9581eafa09fff03f093b96c92ca2696ca9ead32ab6687a822fa14657c8e854064609099c47d42d2b0c3c4ec1e869605f1f2a75cdeb7da27fef8c713ac486eb3fb855ff68c84728fbaa02bddd90255172d705007a7ca4048ad1852a907d08582159b338be84320c0397d5b0ff84973b0e69909ea6e5a72cdc67f65dcdba70ba80efc21d41c5be895277c895752a950ef7f474ddc94343793438ddba24d9ad5dd7efe1b3c731b417470e786775b8e0d070bb65694913bfb1d5f9ae759352a7f212b7ded1b6b98cf5d4669ea07cf6fd14b769e9eb3fcd9af5b9574223d52fdf48077117deba80f1cf514b8234c0729d5bae781e1b8d2098e445a208c07a48190a407814b69260a03ce3ccea41959b34e3d78ebfd01bd723e31886322395e07a0e6bba5c782f162dd23aeb23703dd1f47f6435769a934a610f882d3dbda5d06e3364617e34c500b6000028e839bab35c29446975533815e3d5383a13e62b66ac9e89fab4f6d4ad33c6cef0bd530c9d1aeee5e89367157c4be39de4729abc521aea61b2a3d2e79d00fbe97a7ca934eac92ef72e33ca750092f44bcb2830fce261ddd3c715a4dc61bdf702190abda678e8d8e000363528411b9ffbdad61d0ab0e13482237c3225d4b81323b35fee3e8cd826e916939fd6148ea2fcf43debbbcef9a5e909fcc7d916db8a4d4a91fe40f7edb421b945debd14b1b520481f86f5d75b6155f19baf8713ff45efd01457996f03a11eb85f5c322009e1a6804654375c7ae42c93f5dc051ad9a430007fb8af406f49248deae9bf6afaa76d1f01324f205f857947f26d856b80da5b6da8c5f26b24d981bce6de9fa2feaa920c96463905335bbed6447f5d381622ee63d0dd12ddc0094864cddfad3d27b5f67047151be4f11124eef22fbef99966efda23348325b26a099c2861be553f70db75ebb77dbbc608e75d1d9c82bc398e9e5e7905c11243d4b4d8c79011707638c88733ab3aaec10a32a338f4c95a5d1f37c19bd5a1a1fbefae22c22317dd01947b2a111d98af476906bb23e56584ade11ac599b30640cde1aa5dd7c60b1c801fc32af4b6d7ee45b594137d0d00712c08b398af853fe6a7dc2ccb6ad4b346c5c53f8e45a7aa41612668fd9a0605bf25ee584520b34b2461224e167f35a9a000930b823444d88e9866ba4c5ca57ab12a4be2ef53c1b4dc7c0e0d87637f8e2e4fd68c542e231e0b7565419663794f4fefe2777c5e3be17df90ada7eb65046711b3ea9108766bd8cdc3bc394ecfcf5db1f52a119e074f7106465469b89856a1ff911842d87c914f15926db77d0fd7274554fa9c3af966ac9d51a626ca045b2669171b8b234a46c7db0cdcf79dfac3d4547453985ea3048458db6f2c60a4e71054deaf3ba6c5827bc8c6da24205a9b018c8eb0ef7c345f861de4e873a75a8f5f878f9ac42f68695782ea1b8bff2a437c9139228cde89b2fc0c735b5da48955e1c0127d399b5ba46112b2a0f98fd90b97b59f9788f7c743482685a3d0c9d602a946212d28620ec8234da5a2c4ade484c853a5ddd9d80753cc632ba2ff01b19ba2c665a93f2764999004dc1ffa926ea937d643fa6a0abc78221bc942d90f2a5a949218662cdc085885c5225aed04abb6b20254b3f18d936b71cc600b9ae8e9c57e0728c71b25c2f9546a5ddad49091ee0faea448f2cf37a3439caeae3b25660a0612ee75c3019d8abae1593e0a6dbfd7dc8897fe5898f57723c76f9329d598ce9550b3db5809b06253966b2a5e4f5b9380a6c3db526eeef7dea268609daa3b3feff99a450faaf30f1ce6ac59b94d708553f8717482548c7a8d94ce38a80501424be01dc196c691349f0cb09d8fedf01ffab3b48e96f6f575c3200c95cc1bc156dcb0fd51389ad05238beb7f0560e1f2f4d8857cd87c39273d502684a7f400e964dc94fd78d2545863827bd6cd9d0d2b8ad62529e34387a63040ec7a8d6a8dea215932a3cdec485608f3481581c7a70864cf3789cb93711bb9f98e903c2e05e46b7bc320dd735da1b54f83805d1653f95d823c657bc574010c0144b36500c8873d30c176a8ad400185a9af0c81573ba5a080539663aa6c0b4694b8e002a707227e98f732907cf04cd45e784a9e2f9a4f5808b7bc579605821699aead4e3f7a6fd9312be05b4cf003d0d711020ddac81638544f437800911a0ad6d8dd223bea897ef6b14fc98cc9b53559971c6d5a2c8d696bf34b52039ca168d7b7cdcfe33d40073d963ef345b79713d8afa30b527b7c3e36a61ecce6cfa56701ca62b98b09e7fb6dc231bfdf02ce9f6bf1df44aaa848b2786ecdbb517d84192ab831b106326b479c0e08c3a8fdcdb76b7aec038afb37558b52bb333a608cd8614d85121f37c1acc6e20a0ffc7ff3509443aaeb1a76526995c990ce5df89a67f7f9a38078300e25b3dcc067e21f1d1159d3445c9bfb5c04a16078175474d223323dccad73fcd4fed216b654243ff467a8ca57c05d62624293e4364b69b3a769aa6f21e91ccbe22fca85396ea3c59ad8cc674bf6474e6b5ac385ab0d4ec7243dabb1f4b4544b7887574b9b7381d93cb8106ac973fe395841f86696d958d44bf1bc52d9b9b6d705e264a9a8cbed09c1eacf9a5db2c5ac754a637b5b55e23535813a6ea97dbf166a7bd7db07197c17c163d1c7660780936f1782850a5708a6aba7ec5f8c5f94beccf6b454882a1474b784e42491208018321672e4e77822f04a0fc834c7bdcf9058f265506634e03f9408c3e052e604122c9a3233ca864913bd437718fbaefc03db2f0e83426322b65c1ce3d", 0x1000}, {&(0x7f0000001c40)="d93bae45aedc003ef8", 0x9}, {&(0x7f0000001c80)="dc460aeda762cb547452e646fba7dc57b57cf84447c51a4265bd249d54ff9ede6490675c641cdde05c4b1a9a91b68e6ed2abc484d1619745c20010ee2b4c1ac2d8fdc5cbede8b9c2c3a2e585d504cddeca8335bf009fbf8daedaf45ef8d2fd161007d607b10a7f1492af713c995a8aa69f6e0f943f63f0eaa20f13ec17f205b897cd89d2d2575b67653c69845f6060c924c6c7445d54ecebb1b5307aa8622984caee9a1e20a0255c8c25e9720cdec054f08bce68c221838e9ffa68bc6c5ed9f3cb1f4746dd01f7faca1e83d3fca1422af6b402a293bce9fa8842d4d0485a69", 0xdf}, {&(0x7f0000001d80)="9ddffec1d9a5c63f3998907b31945565d965734b6539dcc4ea3d0b6cf86d5158fcd72f8db56e253a16901ad4fbad8e9d7ebaa11dba807f28858c4ec92ef02f069eecc16292886306bcec9d8908e31912410ec18ab53a7a6931f92337360e080ab34784b3bdd512c87f", 0x69}, {&(0x7f0000003ac0)="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", 0x114}, {&(0x7f0000001f00)="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", 0x1000}], 0x8, &(0x7f0000002f80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x10000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @dev={0xac, 0x14, 0x14, 0x12}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @multicast2}}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private=0xa010100, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xb0}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}], 0x110}}, {{&(0x7f00000030c0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000003340)=[{&(0x7f0000003100)="3212ec094ba1421359d27aeb965e84de3fa62b91e6194c0bfaa6bbc3ac48f9e3409ea71737ca6c70dc2ab38c64bd5dcb5a7f45e1bdb8121c85a5acbd92fb3c82e09cbd02cb3e784a7a311bc2cc5c48d4cf710830739847043781f079c3c084ae693d865e45a837e35b55cc2938f4ccdcf442783176f39f1bbe8b924b1c8aacdb15275a7fe6bcf247e783180ef80716b3224affb8c35a38c9a12b2a523940dae1ffc2f0e4bd57f355ce68", 0xaa}, {&(0x7f00000031c0)="c1", 0x1}, {&(0x7f0000003200)="191a80d9f69d99ddf7a8b019a3ebee217e9a40fc611e948000f6afe17e8ce05fae033bcdcee64a81528e302b842667877f98e2fe087a5fb5b23aac05274812c91536bbca1af2bff7d3ed3e23feaf130795c21af72021c6", 0x57}, {&(0x7f0000003280)="2d073597957b31eb7cb2e07270fe15a0d041ae1736710b5d595478fc00e783158f0b461d98ff9e58f2d2a3429c2ea0b7d5711fac9439cc8d6386b6d13a428b63b87acb5bff21f08fa0500f22f9a9ca1f707060", 0x53}, {&(0x7f0000003300)}], 0x5, &(0x7f00000033c0)=[@ip_retopts={{0x20, 0x0, 0x7, {[@generic={0x89, 0x6, "c1ea67d5"}, @lsrr={0x83, 0x7, 0x6e, [@dev={0xac, 0x14, 0x14, 0x21}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1598}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @local, @remote}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7f}}], 0xa0}}, {{&(0x7f0000003480)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f00000038c0)=[{&(0x7f00000034c0)="81ca50ea7e81fa17b359ed59e07d77d50e26edec635efa54303ae7a471dd543b13ffb03a0a4b461614243f838bb1562aa76e337eba7d2d43f56ea633ed81923d9c96195afcb8b464e9c62603b1f50e064e37cdb9541f342a3213befa780686cd84eb47d6faf5eea804d4c07d0074a984068b58bb7fcdb826bf508031dd9477d26d5e3222fd919758432a47f98f42684496bec64bac5c6138244ffedb05ec62d3d3768e110df9da4193237ccb24b5b5cef53fb5e8988c7fc937605a994c25bbe2ef7e01880fecc0606dc284583599c95b662e2d87cf342f6a57dec4bf727654ead42eff0b3a0919365310cb21f9", 0xed}, {&(0x7f00000035c0)="a0590b", 0x3}, {&(0x7f0000003600)="7f50e11cd508a455776e5ce48b50b968f07eebda71c19bf1604fb95ebf9263aff7eeb6cf1778ec2b9a0181ea3c1546e245b74777216abd80d55c52c721fb3ac30fa04fdec66aadddea9604896ef66f9f3a85364a3c0e201b8253caaeee32757c92aa0282a31eac620eb2f13d584c54941c9549c793bff128e70459644bf6da36c2bd8f4f56130c319f2daa6d12d85361cb", 0x91}, {&(0x7f00000036c0)="05336c89999f1b80284858b95bb24b02221ae6cd6666f4a9c65c0ec6538259", 0x1f}, {&(0x7f0000003700)="2e32f3986b68f2bffd89acbbb40322916cf4f764e62bb1c046f2e0f8c63748ddafdc3002ff887d9fe002bf64a20af0250f0a0ae908fb67f91432bbe63b922050222af02046d450ef9bda5928584dba95416a26b079e2c7060fe27cd4b1d5ad37173e4b122f464c60d94f694227185c7e2539fac321c1e8110415f4b92dd094d03adbc34620f06742633dbd0b08375615ee63d85a9857f08306f25d273ed692a21e5bb521b717bc78a14553329aa21904367a08041e1a996cb36f934603efdc839c23371dd8df29bbaa", 0xc9}, {&(0x7f0000003800)="d0306b059c4564fb040a9f5642204cd7e1cfd2e2c4625b469cdeebcd5581a4c12e4753f3b4fec6363634db24010d1e45787206d310f5d3b49ec1621b7c42f1869518e630d0b5007883b33fec", 0x4c}, {&(0x7f0000003880)="b190748122061678feef3fe6308dff19a0484669257227ae9e6132aa7b31785b028eea037f68784fa0a7cf461456766adf36", 0x32}], 0x7, &(0x7f0000003940)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}], 0x18}}], 0x5, 0x4040000) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:14 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) [ 280.289604][ T9211] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.296964][ T9211] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:14 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:14 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = dup2(r0, 0xffffffffffffffff) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x121002, 0x1c1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800000080004103) [ 280.362062][ T9221] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 280.368938][ T9220] incfs: Backing dir is not set, filesystem can't be mounted. [ 280.372375][ T9218] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 02:58:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:14 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) [ 280.415951][ T9218] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.431147][ T9218] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.438337][ T9218] bridge0: port 1(bridge_slave_0) entered forwarding state 02:58:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:14 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) [ 280.464983][ T9225] incfs: Backing dir is not set, filesystem can't be mounted. [ 280.474671][ T9218] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 280.491099][ T9228] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xb) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x800000080004103) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f0000000000)={0x3, 'vlan0\x00', {0x9}, 0x7fff}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:14 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:14 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = dup2(r0, 0xffffffffffffffff) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x121002, 0x1c1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800000080004103) 02:58:14 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:14 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = dup2(r0, 0xffffffffffffffff) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x121002, 0x1c1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800000080004103) 02:58:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv4_newroute={0x30, 0x18, 0x8, 0x70bd27, 0x25dfdbfd, {0x2, 0x14, 0x0, 0x6, 0xfc, 0x1, 0xc8, 0x4, 0x1e00}, [@RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWTUNNEL_IP_TTL={0x5, 0x4, 0x2}}, @RTA_MARK={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x40041) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) 02:58:14 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:14 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = dup2(r0, 0xffffffffffffffff) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x121002, 0x1c1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800000080004103) 02:58:14 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) [ 280.750310][ T9260] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 280.948854][ T420] device bridge_slave_1 left promiscuous mode [ 280.958554][ T420] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.976100][ T420] device bridge_slave_0 left promiscuous mode [ 280.986030][ T420] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.110459][ T9267] cgroup1: Unknown subsys name 'perf_event' [ 282.116658][ T9267] cgroup1: Unknown subsys name 'net_cls' [ 282.153100][ T9267] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.160746][ T9267] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.168713][ T9267] device bridge_slave_0 entered promiscuous mode [ 282.175631][ T9267] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.183260][ T9267] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.190856][ T9267] device bridge_slave_1 entered promiscuous mode [ 282.227435][ T9267] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.234487][ T9267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.241778][ T9267] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.248909][ T9267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.268940][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.276338][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.285215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.293069][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.308818][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.316948][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.324077][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.331586][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.341327][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.348386][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.356285][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 282.364520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 282.379288][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 282.398278][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 282.406867][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.415791][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 282.425514][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:58:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:16 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:16 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') dup2(r0, 0xffffffffffffffff) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) 02:58:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000010001fff000000000000000000600000dc2b74556a13475119da4a43b8fafe17103dac84c2f320c3da1892ba429af887921bfab59b9bb112ae55049e224be3a4c50865b15129b5f69f32a2bbe277442eb0008a4ee77f2baba9345e1c8067dc8e7f490571baffd732b7241398dcd1474cc1a10b7829e300", @ANYRES32=r2, @ANYBLOB="0000000000000000180012800e00010077697265677561726400000004000280"], 0x38}}, 0x0) 02:58:16 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 282.472467][ T9273] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.479868][ T9273] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:16 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:16 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) sendmsg$nl_route(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@getneigh={0x14, 0x1e, 0x4, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x40084) 02:58:16 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) [ 282.540832][ T9280] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 02:58:16 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:16 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:16 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x1f1000, 0x0) r2 = dup(r1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x800000080004103) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000540)={'bond_slave_0\x00', 0x0}) socket$netlink(0x10, 0x3, 0xa) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x20842, 0x0) sendmsg$TCPDIAG_GETSOCK(r6, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB="90010000120000022bbd7000fcdbdf25230805bf4e204e220100000006000000030000000900000047000000018000001f000000ff010000", @ANYRES32=r5, @ANYBLOB="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"], 0x190}, 0x1, 0x0, 0x0, 0x24000800}, 0x20004010) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r7, r8, 0x0, 0x800000080004103) ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) r9 = socket(0x27, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000800)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)=@ipv4_newroute={0xe4, 0x18, 0x400, 0x70bd2d, 0x25dfdbff, {0x2, 0x80, 0x14, 0x6, 0x0, 0x2, 0xfd, 0xb, 0x800}, [@RTA_UID={0x8}, @RTA_METRICS={0xaa, 0x8, 0x0, 0x1, "f332964c478961628fc990f0b96dfa85b951565d44525d5b6bb065e56ce86a5f41f719e802d21647a670a965e80431811cf2fc53afd696e695e3e05d2de5564a9ac25309dd167b2a18e4d07d23db1a2bf2d0f4c5493e1bee3f57d8144b147bfb0eb6cd9773908939d9173a9fcc73974c09baba5f0c37f9762cc8665d763f60cbd55e3b42eee659a47f3c8b06f73dc88fbe6a092454a514ed12eeaab08d9eaf6b82f27abfcd94"}, @RTA_IIF={0x8}, @RTA_METRICS={0x4}, @RTA_PRIORITY={0x8, 0x6, 0x8000}]}, 0xe4}}, 0x20000090) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000)=0x100, 0x4) sendmsg$nl_route_sched(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c00100da83dc8769d57ef00290018012cbd7000", @ANYRES32=r5, @ANYBLOB="f1ff0a00f2ff040001000300070001006d710000"], 0x2c}, 0x1, 0x0, 0x0, 0x844}, 0x20000080) 02:58:16 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:16 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:16 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:16 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:16 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000010001fff26bd70000000000000600000", @ANYRES32=r2, @ANYBLOB="b11302f1ed610de15261500a0076ce0000000000440012800e000100770717fabba1bcf1fce4ab8dad7aee8594d2f9c32a5900abb5880d3224b4bab6de2ee1469d5576d8ca9aac25d9c8ab98782fc4e66adb38e614420a1c6b1e34ff2f3902a34c0a4bf4c6a88b9b2be084e57d80a38ba865e628e88d2d89122e29df0f31e9853731c5e3e8fc73d7a7fb64e8b3d68881f8de28408423d1"], 0x38}}, 0x8000) 02:58:17 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:17 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:17 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:17 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:17 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x3) [ 283.071769][ T9332] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.072335][ T9332] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:17 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 283.268837][ T9336] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 283.308297][ T91] device bridge_slave_1 left promiscuous mode [ 283.315677][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.335492][ T91] device bridge_slave_0 left promiscuous mode [ 283.347037][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.534551][ T9358] cgroup1: Unknown subsys name 'perf_event' [ 284.540835][ T9358] cgroup1: Unknown subsys name 'net_cls' [ 284.579072][ T9358] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.586273][ T9358] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.594096][ T9358] device bridge_slave_0 entered promiscuous mode [ 284.601581][ T9358] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.609098][ T9358] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.616515][ T9358] device bridge_slave_1 entered promiscuous mode [ 284.654008][ T9358] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.661279][ T9358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.668668][ T9358] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.675814][ T9358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.696383][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.704550][ T2081] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.712998][ T2081] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.720863][ T91] device bridge_slave_1 left promiscuous mode [ 284.727173][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.734421][ T91] device bridge_slave_0 left promiscuous mode [ 284.740573][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.808463][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.816863][ T2081] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.824037][ T2081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.831575][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.839910][ T2081] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.847059][ T2081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.854478][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.862975][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.877762][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.889110][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.903493][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.919428][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.927742][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:58:19 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:19 executing program 2: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:58:19 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:19 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0\x00', 0x10000, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:19 executing program 5: ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, &(0x7f0000000000)=0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 284.969215][ T9364] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.976527][ T9364] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:19 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000480)={{}, {0x1, 0x6}, [{0x2, 0x4}, {0x2, 0x4, 0xee00}, {0x2, 0x4}, {}, {0x2, 0x3, 0xee00}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1}, {0x8, 0x0, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x1}], {0x10, 0xc}}, 0x84, 0x3) 02:58:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'vlan1\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:19 executing program 4: mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="3800000010001f00000000000040000000600000", @ANYRES32=r2, @ANYBLOB="0000000000000000180012800e00010077697265677561726400000004000280"], 0x38}}, 0x0) 02:58:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:19 executing program 4: mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:19 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x3) [ 286.107872][ T91] device bridge_slave_1 left promiscuous mode [ 286.114226][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.121883][ T91] device bridge_slave_0 left promiscuous mode [ 286.128450][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.598921][ T9404] cgroup1: Unknown subsys name 'perf_event' [ 286.605243][ T9404] cgroup1: Unknown subsys name 'net_cls' [ 286.642099][ T9404] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.649227][ T9404] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.656707][ T9404] device bridge_slave_0 entered promiscuous mode [ 286.664326][ T9404] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.671763][ T9404] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.679445][ T9404] device bridge_slave_1 entered promiscuous mode [ 286.715305][ T9404] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.722355][ T9404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.729660][ T9404] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.736682][ T9404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.756900][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.764456][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.773157][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.782518][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.790917][ T2081] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.797985][ T2081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.807952][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.816130][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.823314][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.838802][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.858226][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.866764][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.888897][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.898289][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.906803][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:58:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:21 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:58:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) dup3(r2, r1, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000001c0)=0x3) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:21 executing program 4: mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 286.915050][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 02:58:21 executing program 4: mkdir(0x0, 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:21 executing program 4: mkdir(0x0, 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:21 executing program 4: mkdir(0x0, 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 287.266606][ T9437] bridge0: port 2(bridge_slave_1) entered disabled state 02:58:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) dup3(0xffffffffffffffff, r1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000001c0)=0x3) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 287.962321][ T91] device bridge_slave_1 left promiscuous mode [ 287.968746][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.976712][ T91] device bridge_slave_0 left promiscuous mode [ 287.984114][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.664708][ T9466] cgroup1: Unknown subsys name 'perf_event' [ 288.671357][ T9466] cgroup1: Unknown subsys name 'net_cls' [ 288.707226][ T9466] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.714655][ T9466] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.722286][ T9466] device bridge_slave_0 entered promiscuous mode [ 288.729953][ T9466] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.736963][ T9466] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.744485][ T9466] device bridge_slave_1 entered promiscuous mode [ 288.781486][ T9466] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.788553][ T9466] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.795863][ T9466] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.802901][ T9466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.823354][ T1797] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.831489][ T1797] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.840778][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.848886][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.858355][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.866656][ T150] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.873808][ T150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.882711][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.891082][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.898614][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.911715][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.927911][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.936446][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.948080][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.968734][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 288.977037][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 288.986113][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:58:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:23 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:23 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) dup3(r1, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:23 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) dup3(0xffffffffffffffff, r1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000001c0)=0x3) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) dup3(r2, r1, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 289.024615][ T9472] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.031906][ T9472] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.084041][ T9476] incfs: Backing dir is not set, filesystem can't be mounted. 02:58:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) dup3(r2, r1, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x0, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:23 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 289.235185][ T9492] incfs: Backing dir is not set, filesystem can't be mounted. 02:58:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) dup3(r2, r1, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:23 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) dup3(r2, r1, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) dup3(r2, r0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 289.370735][ T9506] incfs: Backing dir is not set, filesystem can't be mounted. [ 290.387572][ T91] device bridge_slave_1 left promiscuous mode [ 290.393706][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.401645][ T91] device bridge_slave_0 left promiscuous mode [ 290.408358][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.724875][ T9523] cgroup1: Unknown subsys name 'perf_event' [ 290.731137][ T9523] cgroup1: Unknown subsys name 'net_cls' [ 290.767561][ T9523] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.774759][ T9523] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.782876][ T9523] device bridge_slave_0 entered promiscuous mode [ 290.790373][ T9523] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.797724][ T9523] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.805152][ T9523] device bridge_slave_1 entered promiscuous mode [ 290.841535][ T9523] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.848697][ T9523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.855938][ T9523] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.862981][ T9523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.883935][ T2025] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.891874][ T2025] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.900909][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.908821][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.918224][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.927937][ T2807] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.934978][ T2807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.957696][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.965932][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.973129][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.997553][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 291.005920][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.016288][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.018033][ T9528] cgroup1: Unknown subsys name 'perf_event' [ 291.030623][ T9528] cgroup1: Unknown subsys name 'net_cls' [ 291.037681][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.045706][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 291.060654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.070170][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 02:58:25 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:25 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) dup3(r2, r1, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:25 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) dup3(r2, r0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 291.134896][ T9528] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.145157][ T9528] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.158349][ T9528] device bridge_slave_0 entered promiscuous mode [ 291.181596][ T9528] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.230899][ T9528] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.287762][ T9528] device bridge_slave_1 entered promiscuous mode [ 291.352518][ T9528] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.359698][ T9528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.367033][ T9528] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.374053][ T9528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.416764][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.424813][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.432087][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.441632][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 291.450007][ T2081] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.457046][ T2081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.467362][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 291.475493][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.482560][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.497691][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.505677][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.518766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 291.537561][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.545449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:58:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x0, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:25 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:25 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) dup3(r2, r0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:25 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) dup3(0xffffffffffffffff, r1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 291.562215][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 291.572035][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.596105][ T9566] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.603513][ T9566] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x0, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:25 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:25 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 291.771221][ T9589] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 02:58:25 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 291.923969][ T9590] bridge0: port 2(bridge_slave_1) entered disabled state 02:58:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x0, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 291.924537][ T9590] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:26 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:26 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:26 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 292.197329][ T9598] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 02:58:26 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 292.273460][ T9631] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 02:58:26 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) [ 292.622410][ T91] device bridge_slave_1 left promiscuous mode [ 292.629160][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.636628][ T91] device bridge_slave_0 left promiscuous mode [ 292.642975][ T91] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 293.695866][ T9662] cgroup1: Unknown subsys name 'perf_event' [ 293.702076][ T9662] cgroup1: Unknown subsys name 'net_cls' [ 293.739592][ T9662] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.747495][ T9662] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.755120][ T9662] device bridge_slave_0 entered promiscuous mode [ 293.762939][ T9662] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.770254][ T9662] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.778050][ T9662] device bridge_slave_1 entered promiscuous mode [ 293.832117][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.840204][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.850618][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.859415][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.867859][ T2081] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.875038][ T2081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.897099][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.905733][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.913770][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.922617][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.931479][ T2081] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.938757][ T2081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.947220][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.955376][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.967240][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.986304][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.995266][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.004530][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.013789][ T91] device bridge_slave_1 left promiscuous mode [ 294.020337][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.028153][ T91] device bridge_slave_0 left promiscuous mode [ 294.034415][ T91] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x0, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:28 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:28 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:28 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 294.140113][ T9668] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.147815][ T9668] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:28 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x0, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:28 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:28 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004103) 02:58:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 295.216798][ T91] device bridge_slave_1 left promiscuous mode [ 295.225799][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.233692][ T91] device bridge_slave_0 left promiscuous mode [ 295.240501][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.758280][ T9714] cgroup1: Unknown subsys name 'perf_event' [ 295.764402][ T9714] cgroup1: Unknown subsys name 'net_cls' [ 295.801190][ T9714] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.808548][ T9714] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.815843][ T9714] device bridge_slave_0 entered promiscuous mode [ 295.823472][ T9714] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.831007][ T9714] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.839006][ T9714] device bridge_slave_1 entered promiscuous mode [ 295.887913][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.897058][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.910760][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.919410][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.928350][ T2081] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.935362][ T2081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.943083][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.951880][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.962033][ T2081] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.975948][ T2081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.984409][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 296.003358][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.027438][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.047115][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.055609][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.064636][ T9719] cgroup1: Unknown subsys name 'perf_event' [ 296.071041][ T9719] cgroup1: Unknown subsys name 'net_cls' [ 296.077327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.085805][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.094980][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.170890][ T9719] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.178613][ T9719] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.186185][ T9719] device bridge_slave_0 entered promiscuous mode [ 296.199529][ T9719] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.207287][ T9719] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.214640][ T9719] device bridge_slave_1 entered promiscuous mode 02:58:30 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) signalfd4(r0, 0x0, 0x0, 0x80000) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:30 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004103) 02:58:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 296.256069][ T9719] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.263153][ T9719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.270494][ T9719] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.277711][ T9719] bridge0: port 1(bridge_slave_0) entered forwarding state 02:58:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 296.319112][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.331109][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.344101][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.377138][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.388732][ T2081] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.395792][ T2081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.420268][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.431137][ T2081] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.438210][ T2081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.482822][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.495142][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.506588][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.526926][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.534932][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.545991][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.557320][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:58:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0x0, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:30 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004103) 02:58:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 296.602140][ T9761] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.609836][ T9761] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:31 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0x0, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:31 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) 02:58:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:31 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) 02:58:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:31 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 297.297635][ T91] device bridge_slave_1 left promiscuous mode [ 297.304169][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.326647][ T91] device bridge_slave_0 left promiscuous mode [ 297.340086][ T91] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:31 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) 02:58:31 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x0) [ 298.825812][ T9826] cgroup1: Unknown subsys name 'perf_event' [ 298.832325][ T9826] cgroup1: Unknown subsys name 'net_cls' [ 298.869743][ T9826] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.876920][ T9826] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.884242][ T9826] device bridge_slave_0 entered promiscuous mode [ 298.891923][ T9826] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.899166][ T9826] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.906618][ T9826] device bridge_slave_1 entered promiscuous mode [ 298.943363][ T9826] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.950586][ T9826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.957888][ T9826] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.964901][ T9826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.985168][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.992447][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.001435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.009337][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.026541][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.034873][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.041924][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.049477][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.057810][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.064828][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.073141][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.081307][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.094728][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 299.106215][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.120129][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 299.135348][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.144195][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:58:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0x0, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:33 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x0) [ 299.187809][ T9832] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.195225][ T9832] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0x0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x0) 02:58:33 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) signalfd4(r0, 0x0, 0x0, 0x80000) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0x0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:33 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) 02:58:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) 02:58:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:33 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 299.776358][ T420] device bridge_slave_1 left promiscuous mode [ 299.782714][ T420] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.864793][ T420] device bridge_slave_0 left promiscuous mode [ 299.895603][ T420] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.193127][ T9918] cgroup1: Unknown subsys name 'perf_event' [ 301.199287][ T9918] cgroup1: Unknown subsys name 'net_cls' [ 301.237214][ T9918] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.244402][ T9918] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.252748][ T9918] device bridge_slave_0 entered promiscuous mode [ 301.260199][ T9918] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.267913][ T9918] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.275377][ T9918] device bridge_slave_1 entered promiscuous mode [ 301.312642][ T9918] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.319689][ T9918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.327087][ T9918] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.334197][ T9918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.354888][ T2022] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.362950][ T2022] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.370971][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.379261][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.388512][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.396792][ T149] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.404011][ T149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.426285][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 301.435200][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.443504][ T2022] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.450706][ T2022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.458285][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.466285][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.486343][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 301.494637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 301.503546][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 301.513398][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 02:58:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0x0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) 02:58:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:35 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 301.556973][ T9924] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.564440][ T9924] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 02:58:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0}, 0x9, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:35 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 02:58:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 02:58:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:36 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:58:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0}, 0x9, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:58:36 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:58:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 302.106177][ T7] device bridge_slave_1 left promiscuous mode [ 302.112467][ T7] bridge0: port 2(bridge_slave_1) entered disabled state 02:58:36 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:36 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:36 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 302.190154][ T7] device bridge_slave_0 left promiscuous mode [ 302.223231][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.684597][T10015] cgroup1: Unknown subsys name 'perf_event' [ 303.691102][T10015] cgroup1: Unknown subsys name 'net_cls' [ 303.729551][T10015] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.737100][T10015] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.744417][T10015] device bridge_slave_0 entered promiscuous mode [ 303.751497][T10015] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.758590][T10015] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.766084][T10015] device bridge_slave_1 entered promiscuous mode [ 303.803421][T10015] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.810739][T10015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.818037][T10015] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.825043][T10015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.846705][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.854065][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.861940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.870422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.886760][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.895022][ T2022] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.902076][ T2022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.909547][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.918040][ T2022] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.925059][ T2022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.932752][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.955831][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 303.964111][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.972185][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 303.981868][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.993427][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 304.005790][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:58:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0}, 0x9, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) 02:58:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:38 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 304.049369][T10021] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.056765][T10021] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) 02:58:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x25, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d99"}, 0x2e, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) 02:58:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:38 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 02:58:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x25, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d99"}, 0x2e, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 02:58:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:38 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}}, 0x20}}, 0x0) 02:58:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 02:58:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:58:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}}, 0x20}}, 0x0) 02:58:38 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 304.685408][ T7] device bridge_slave_1 left promiscuous mode [ 304.692046][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.744873][ T7] device bridge_slave_0 left promiscuous mode [ 304.771985][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.167197][T10108] cgroup1: Unknown subsys name 'perf_event' [ 306.173523][T10108] cgroup1: Unknown subsys name 'net_cls' [ 306.209872][T10108] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.217159][T10108] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.224489][T10108] device bridge_slave_0 entered promiscuous mode [ 306.232265][T10108] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.239572][T10108] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.246993][T10108] device bridge_slave_1 entered promiscuous mode [ 306.283201][T10108] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.290269][T10108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.297599][T10108] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.304617][T10108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.324725][ T2022] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.332172][ T2022] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.340698][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.348469][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.365923][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.374125][ T2022] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.381257][ T2022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.388783][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.397025][ T2022] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.404034][ T2022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.412098][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.420135][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 306.433188][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 306.445350][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.464396][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 306.473106][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 306.481825][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 306.522908][T10114] bridge0: port 2(bridge_slave_1) entered disabled state 02:58:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x25, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d99"}, 0x2e, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:58:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}}, 0x20}}, 0x0) 02:58:40 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 306.530363][T10114] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:58:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x37, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa"}, 0x40, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:40 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:58:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:41 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:58:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:58:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 307.115753][ T91] device bridge_slave_1 left promiscuous mode [ 307.126232][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.139019][ T91] device bridge_slave_0 left promiscuous mode [ 307.145230][ T91] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 308.426003][T10197] cgroup1: Unknown subsys name 'perf_event' [ 308.432249][T10197] cgroup1: Unknown subsys name 'net_cls' [ 308.469137][T10197] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.476411][T10197] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.483725][T10197] device bridge_slave_0 entered promiscuous mode [ 308.491063][T10197] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.498436][T10197] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.506048][T10197] device bridge_slave_1 entered promiscuous mode [ 308.542659][T10197] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.549808][T10197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.557079][T10197] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.564086][T10197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.583901][ T2022] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.591776][ T2022] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.599648][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 308.607838][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.625658][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.633787][ T2022] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.640833][ T2022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.648397][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.656615][ T2022] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.663639][ T2022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.671701][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.679924][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.692535][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 308.704950][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.723740][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 308.732738][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 308.741673][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 308.783199][T10203] bridge0: port 2(bridge_slave_1) entered disabled state 02:58:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) signalfd4(r0, 0x0, 0x0, 0x80000) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:42 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:58:42 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x37, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa"}, 0x40, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 308.790751][T10203] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}}, 0x20}}, 0x0) 02:58:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x37, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa"}, 0x40, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}}, 0x20}}, 0x0) 02:58:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}}, 0x20}}, 0x0) 02:58:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:43 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) signalfd4(r0, 0x0, 0x0, 0x80000) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:43 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 309.334852][ T7] device bridge_slave_1 left promiscuous mode [ 309.342196][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.357305][ T7] device bridge_slave_0 left promiscuous mode [ 309.370049][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:43 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:43 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:43 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 310.584327][T10297] cgroup1: Unknown subsys name 'perf_event' [ 310.590639][T10297] cgroup1: Unknown subsys name 'net_cls' [ 310.627226][T10297] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.634387][T10297] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.642485][T10297] device bridge_slave_0 entered promiscuous mode [ 310.649727][T10297] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.657103][T10297] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.664517][T10297] device bridge_slave_1 entered promiscuous mode [ 310.701031][T10297] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.708120][T10297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.715504][T10297] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.722628][T10297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.743680][ T150] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.751014][ T150] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.760111][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.767964][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.785186][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.793468][ T150] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.800506][ T150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.808038][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.816322][ T150] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.823337][ T150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.831499][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.839587][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.852557][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 310.865177][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.883574][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 310.892547][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.901370][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:58:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x40, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d517"}, 0x49, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 310.943241][T10303] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.950520][T10303] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x40, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d517"}, 0x49, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x37, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa"}, 0x40, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x40, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d517"}, 0x49, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 311.293328][T10332] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.301003][T10332] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:58:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 311.824855][ T91] device bridge_slave_1 left promiscuous mode [ 311.831170][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.838495][ T91] device bridge_slave_0 left promiscuous mode [ 311.847767][ T91] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:46 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:46 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:58:46 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 312.885350][ T91] device bridge_slave_1 left promiscuous mode [ 312.892002][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.900008][ T91] device bridge_slave_0 left promiscuous mode [ 312.902145][T10412] cgroup1: Unknown subsys name 'perf_event' [ 312.906560][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.912970][T10412] cgroup1: Unknown subsys name 'net_cls' [ 313.008434][T10412] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.015998][T10412] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.023320][T10412] device bridge_slave_0 entered promiscuous mode [ 313.030539][T10412] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.037719][T10412] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.045255][T10412] device bridge_slave_1 entered promiscuous mode 02:58:47 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 313.083425][T10412] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.090490][T10412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.097801][T10412] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.104854][T10412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.149438][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.161531][ T150] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.170738][ T150] bridge0: port 2(bridge_slave_1) entered disabled state 02:58:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 313.195033][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 313.203328][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.215225][ T150] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.222600][ T150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.250040][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.258529][ T150] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.265701][ T150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.273464][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.283991][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.330797][T10429] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.336871][T10430] cgroup1: Unknown subsys name 'perf_event' [ 313.338332][T10429] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.344110][T10430] cgroup1: Unknown subsys name 'net_cls' [ 313.404443][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.412559][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 313.446125][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 313.470000][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 313.546037][T10436] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.553311][T10436] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x45, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6"}, 0x4e, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:47 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 313.592774][T10430] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.605666][T10430] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.621235][T10430] device bridge_slave_0 entered promiscuous mode [ 313.631102][T10430] bridge0: port 2(bridge_slave_1) entered blocking state 02:58:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) [ 313.644042][T10430] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.659326][T10430] device bridge_slave_1 entered promiscuous mode [ 313.878970][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.888906][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.920271][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.932080][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.950294][ T149] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.957372][ T149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.984022][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.000172][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.018291][ T149] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.025369][ T149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.056959][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 314.073829][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.091197][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.107724][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.119294][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.136782][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.148859][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 314.160571][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 314.204727][ T91] device bridge_slave_1 left promiscuous mode [ 314.210917][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.226583][ T91] device bridge_slave_0 left promiscuous mode [ 314.232956][ T91] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:49 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x45, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6"}, 0x4e, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:49 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:49 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:49 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x10a005, 0xfffffffe, 0x0, 0x0, 0x0, [{0x80}]}}) 02:58:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 315.474377][ T91] device bridge_slave_1 left promiscuous mode [ 315.481663][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.504382][ T91] device bridge_slave_0 left promiscuous mode [ 315.523448][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.547894][T10505] cgroup1: Unknown subsys name 'perf_event' [ 315.559544][T10505] cgroup1: Unknown subsys name 'net_cls' [ 315.702959][T10505] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.710234][T10505] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.718282][T10505] device bridge_slave_0 entered promiscuous mode [ 315.725745][T10505] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.732863][T10505] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.741075][T10505] device bridge_slave_1 entered promiscuous mode [ 315.792823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 315.800804][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 315.810192][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 315.818775][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 315.827112][ T150] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.834279][ T150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.842173][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.853462][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 315.861958][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 315.870616][ T150] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.877683][ T150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.889237][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 315.899687][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.915387][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 315.926783][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.944806][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.953850][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 315.963078][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:58:50 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:50 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:58:50 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:58:50 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 316.065333][T10525] FAULT_INJECTION: forcing a failure. [ 316.065333][T10525] name failslab, interval 1, probability 0, space 0, times 0 [ 316.086218][T10525] CPU: 0 PID: 10525 Comm: syz-executor.5 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 316.096493][T10525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.106536][T10525] Call Trace: [ 316.109825][T10525] dump_stack+0x1d8/0x24e [ 316.114155][T10525] ? devkmsg_release+0x11c/0x11c [ 316.119087][T10525] ? show_regs_print_info+0x12/0x12 [ 316.124280][T10525] ? __local_bh_enable_ip+0x48/0x70 [ 316.129503][T10525] ? netlink_insert+0xb5d/0x1030 [ 316.134607][T10525] should_fail+0x6f6/0x860 [ 316.139024][T10525] ? setup_fault_attr+0x3d0/0x3d0 [ 316.144048][T10525] ? netlink_data_ready+0x10/0x10 [ 316.149066][T10525] ? rht_key_hashfn+0x1e0/0x1e0 [ 316.153920][T10525] ? netlink_hash+0xd0/0xd0 [ 316.158413][T10525] ? __alloc_skb+0x75/0x4d0 [ 316.162919][T10525] should_failslab+0x5/0x20 [ 316.167408][T10525] kmem_cache_alloc+0x36/0x290 [ 316.172156][T10525] ? refcount_add_checked+0x50/0x50 [ 316.177522][T10525] __alloc_skb+0x75/0x4d0 [ 316.181852][T10525] ? netlink_autobind+0x163/0x190 [ 316.186869][T10525] netlink_sendmsg+0x748/0xd40 [ 316.191671][T10525] ? netlink_getsockopt+0x8e0/0x8e0 [ 316.196867][T10525] ? import_iovec+0x1bc/0x380 [ 316.201652][T10525] ? security_socket_sendmsg+0x9d/0xb0 [ 316.207177][T10525] ? netlink_getsockopt+0x8e0/0x8e0 [ 316.212347][T10525] ____sys_sendmsg+0x583/0x8c0 [ 316.217085][T10525] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 316.222256][T10525] ? __lru_cache_add+0x1c4/0x210 [ 316.227173][T10525] ? proc_fail_nth_read+0x1c0/0x1c0 [ 316.232878][T10525] __sys_sendmsg+0x2c4/0x3b0 [ 316.237551][T10525] ? ____sys_sendmsg+0x8c0/0x8c0 [ 316.242676][T10525] ? check_preemption_disabled+0x9e/0x330 [ 316.248385][T10525] ? fput_many+0x42/0x1a0 [ 316.252691][T10525] ? check_preemption_disabled+0x154/0x330 [ 316.258644][T10525] do_syscall_64+0xcb/0x1e0 [ 316.263262][T10525] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.269131][T10525] RIP: 0033:0x4665d9 [ 316.273002][T10525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 316.292584][T10525] RSP: 002b:00007ff431092188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 316.300984][T10525] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 316.308973][T10525] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 316.317043][T10525] RBP: 00007ff4310921d0 R08: 0000000000000000 R09: 0000000000000000 [ 316.325150][T10525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 316.333113][T10525] R13: 00007ffdd04e7fdf R14: 00007ff431092300 R15: 0000000000022000 [ 316.768488][T10540] cgroup1: Unknown subsys name 'perf_event' [ 316.774736][T10540] cgroup1: Unknown subsys name 'net_cls' [ 316.815187][T10540] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.822464][T10540] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.830604][T10540] device bridge_slave_0 entered promiscuous mode [ 316.838176][T10540] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.845587][T10540] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.853032][T10540] device bridge_slave_1 entered promiscuous mode [ 316.893366][T10540] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.900523][T10540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.907844][T10540] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.914879][T10540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.957101][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.965805][ T2023] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.973320][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.981695][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.004923][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 317.013346][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.022605][ T2023] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.029674][ T2023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.037175][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.045174][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.064017][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.072306][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 317.081067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.089374][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 02:58:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x45, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6"}, 0x4e, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:51 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:51 executing program 5 (fault-call:3 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:51 executing program 4 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:51 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:58:51 executing program 3 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 317.135675][T10549] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.142977][T10549] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.205249][T10556] FAULT_INJECTION: forcing a failure. [ 317.205249][T10556] name failslab, interval 1, probability 0, space 0, times 0 [ 317.213765][T10558] FAULT_INJECTION: forcing a failure. [ 317.213765][T10558] name failslab, interval 1, probability 0, space 0, times 0 [ 317.219140][T10556] CPU: 0 PID: 10556 Comm: syz-executor.2 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 317.240787][T10556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.250831][T10556] Call Trace: [ 317.254121][T10556] dump_stack+0x1d8/0x24e [ 317.258429][T10556] ? devkmsg_release+0x11c/0x11c [ 317.263340][T10556] ? show_regs_print_info+0x12/0x12 [ 317.268519][T10556] ? __local_bh_enable_ip+0x48/0x70 [ 317.273698][T10556] ? netlink_insert+0xb5d/0x1030 [ 317.278609][T10556] should_fail+0x6f6/0x860 [ 317.283084][T10556] ? setup_fault_attr+0x3d0/0x3d0 [ 317.288088][T10556] ? netlink_data_ready+0x10/0x10 [ 317.293113][T10556] ? rht_key_hashfn+0x1e0/0x1e0 [ 317.297955][T10556] ? netlink_hash+0xd0/0xd0 [ 317.302475][T10556] ? __alloc_skb+0x75/0x4d0 [ 317.306968][T10556] should_failslab+0x5/0x20 [ 317.311444][T10556] kmem_cache_alloc+0x36/0x290 [ 317.316182][T10556] ? refcount_add_checked+0x50/0x50 [ 317.321359][T10556] __alloc_skb+0x75/0x4d0 [ 317.325664][T10556] ? netlink_autobind+0x163/0x190 [ 317.330661][T10556] netlink_sendmsg+0x748/0xd40 [ 317.335430][T10556] ? netlink_getsockopt+0x8e0/0x8e0 [ 317.340632][T10556] ? import_iovec+0x1bc/0x380 [ 317.345284][T10556] ? security_socket_sendmsg+0x9d/0xb0 [ 317.350714][T10556] ? netlink_getsockopt+0x8e0/0x8e0 [ 317.355885][T10556] ____sys_sendmsg+0x583/0x8c0 [ 317.360621][T10556] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 317.365790][T10556] ? __lru_cache_add+0x1c4/0x210 [ 317.370701][T10556] ? proc_fail_nth_read+0x1c0/0x1c0 [ 317.375902][T10556] __sys_sendmsg+0x2c4/0x3b0 [ 317.380484][T10556] ? ____sys_sendmsg+0x8c0/0x8c0 [ 317.385402][T10556] ? check_preemption_disabled+0x9e/0x330 [ 317.391101][T10556] ? fput_many+0x42/0x1a0 [ 317.395405][T10556] ? check_preemption_disabled+0x154/0x330 [ 317.401185][T10556] do_syscall_64+0xcb/0x1e0 [ 317.405689][T10556] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.411559][T10556] RIP: 0033:0x4665d9 [ 317.415436][T10556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.435014][T10556] RSP: 002b:00007eff6ff80188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 317.443475][T10556] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 02:58:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x47, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb12"}, 0x50, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 317.451593][T10556] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 317.459541][T10556] RBP: 00007eff6ff801d0 R08: 0000000000000000 R09: 0000000000000000 [ 317.467484][T10556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 317.475519][T10556] R13: 00007ffce586181f R14: 00007eff6ff80300 R15: 0000000000022000 [ 317.487837][T10555] FAULT_INJECTION: forcing a failure. [ 317.487837][T10555] name failslab, interval 1, probability 0, space 0, times 0 [ 317.502183][T10558] CPU: 0 PID: 10558 Comm: syz-executor.3 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 317.504625][T10561] FAULT_INJECTION: forcing a failure. [ 317.504625][T10561] name failslab, interval 1, probability 0, space 0, times 0 [ 317.512420][T10558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.512423][T10558] Call Trace: [ 317.512440][T10558] dump_stack+0x1d8/0x24e [ 317.512450][T10558] ? devkmsg_release+0x11c/0x11c [ 317.512464][T10558] ? show_regs_print_info+0x12/0x12 [ 317.552772][T10558] ? __lru_cache_add+0x1c4/0x210 [ 317.557724][T10558] should_fail+0x6f6/0x860 [ 317.562128][T10558] ? setup_fault_attr+0x3d0/0x3d0 [ 317.567172][T10558] ? __kernel_write+0x340/0x340 [ 317.572004][T10558] ? check_preemption_disabled+0x9e/0x330 [ 317.577708][T10558] ? getname_flags+0xba/0x640 [ 317.582369][T10558] should_failslab+0x5/0x20 [ 317.586863][T10558] kmem_cache_alloc+0x36/0x290 [ 317.591608][T10558] ? __fsnotify_parent+0x310/0x310 [ 317.596703][T10558] getname_flags+0xba/0x640 [ 317.601187][T10558] user_path_at_empty+0x28/0x50 [ 317.606025][T10558] path_setxattr+0xad/0x240 [ 317.610506][T10558] ? fput_many+0x42/0x1a0 [ 317.614817][T10558] ? check_preemption_disabled+0x154/0x330 [ 317.620608][T10558] ? simple_xattr_list_add+0xf0/0xf0 [ 317.625871][T10558] ? __ia32_sys_read+0x80/0x80 [ 317.630617][T10558] __x64_sys_lsetxattr+0xb4/0xd0 [ 317.635536][T10558] do_syscall_64+0xcb/0x1e0 [ 317.640030][T10558] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.645910][T10558] RIP: 0033:0x4665d9 [ 317.649791][T10558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.669379][T10558] RSP: 002b:00007f0683782188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 317.678071][T10558] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 317.686018][T10558] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 317.693973][T10558] RBP: 00007f06837821d0 R08: 0000000000000000 R09: 0000000000000000 02:58:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x47, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb12"}, 0x50, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 317.703049][T10558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 317.711047][T10558] R13: 00007ffe3d3f922f R14: 00007f0683782300 R15: 0000000000022000 [ 317.719019][T10561] CPU: 1 PID: 10561 Comm: syz-executor.5 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 317.729287][T10561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.739330][T10561] Call Trace: [ 317.742602][T10561] dump_stack+0x1d8/0x24e [ 317.746910][T10561] ? devkmsg_release+0x11c/0x11c [ 317.751835][T10561] ? show_regs_print_info+0x12/0x12 [ 317.757027][T10561] should_fail+0x6f6/0x860 [ 317.761418][T10561] ? setup_fault_attr+0x3d0/0x3d0 [ 317.766417][T10561] ? netlink_sendmsg+0x748/0xd40 [ 317.771345][T10561] should_failslab+0x5/0x20 [ 317.775823][T10561] __kmalloc_track_caller+0x5d/0x2e0 [ 317.781083][T10561] ? kmem_cache_alloc+0x115/0x290 [ 317.786085][T10561] ? netlink_sendmsg+0x748/0xd40 [ 317.790999][T10561] __alloc_skb+0xaf/0x4d0 [ 317.795306][T10561] ? netlink_autobind+0x163/0x190 [ 317.800389][T10561] netlink_sendmsg+0x748/0xd40 [ 317.805136][T10561] ? netlink_getsockopt+0x8e0/0x8e0 [ 317.810307][T10561] ? import_iovec+0x1bc/0x380 [ 317.815004][T10561] ? security_socket_sendmsg+0x9d/0xb0 [ 317.820435][T10561] ? netlink_getsockopt+0x8e0/0x8e0 [ 317.825614][T10561] ____sys_sendmsg+0x583/0x8c0 [ 317.830356][T10561] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 317.835561][T10561] ? __lru_cache_add+0x1c4/0x210 [ 317.840525][T10561] ? proc_fail_nth_read+0x1c0/0x1c0 [ 317.845704][T10561] __sys_sendmsg+0x2c4/0x3b0 [ 317.850301][T10561] ? ____sys_sendmsg+0x8c0/0x8c0 [ 317.855238][T10561] ? check_preemption_disabled+0x9e/0x330 [ 317.860932][T10561] ? fput_many+0x42/0x1a0 [ 317.865234][T10561] ? check_preemption_disabled+0x154/0x330 [ 317.871025][T10561] do_syscall_64+0xcb/0x1e0 [ 317.875526][T10561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.881394][T10561] RIP: 0033:0x4665d9 [ 317.885273][T10561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.904946][T10561] RSP: 002b:00007ff431071188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 317.913331][T10561] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 317.921277][T10561] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 317.929226][T10561] RBP: 00007ff4310711d0 R08: 0000000000000000 R09: 0000000000000000 [ 317.937189][T10561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 317.945137][T10561] R13: 00007ffdd04e7fdf R14: 00007ff431071300 R15: 0000000000022000 [ 317.953244][T10555] CPU: 0 PID: 10555 Comm: syz-executor.4 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 317.963491][T10555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.973540][T10555] Call Trace: [ 317.976988][T10555] dump_stack+0x1d8/0x24e [ 317.981290][T10555] ? devkmsg_release+0x11c/0x11c [ 317.986200][T10555] ? show_regs_print_info+0x12/0x12 [ 317.991382][T10555] ? is_bpf_text_address+0x280/0x2a0 [ 317.996646][T10555] should_fail+0x6f6/0x860 [ 318.001045][T10555] ? setup_fault_attr+0x3d0/0x3d0 [ 318.006065][T10555] ? refcount_inc_not_zero_checked+0x1a1/0x280 [ 318.012278][T10555] ? alloc_pipe_info+0x9f/0x390 [ 318.017112][T10555] should_failslab+0x5/0x20 [ 318.021677][T10555] kmem_cache_alloc_trace+0x39/0x2b0 [ 318.027026][T10555] alloc_pipe_info+0x9f/0x390 [ 318.031673][T10555] splice_direct_to_actor+0x999/0xb30 [ 318.037022][T10555] ? kstrtouint_from_user+0x20f/0x2a0 [ 318.042364][T10555] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 318.048502][T10555] ? avc_policy_seqno+0x17/0x70 [ 318.053321][T10555] ? do_splice_direct+0x3e0/0x3e0 [ 318.058319][T10555] ? pipe_to_sendpage+0x300/0x300 [ 318.063327][T10555] ? security_file_permission+0x128/0x300 [ 318.069015][T10555] do_splice_direct+0x28b/0x3e0 [ 318.073858][T10555] ? splice_direct_to_actor+0xb30/0xb30 [ 318.079372][T10555] ? avc_policy_seqno+0x17/0x70 [ 318.084196][T10555] ? security_file_permission+0x128/0x300 [ 318.089885][T10555] do_sendfile+0x8e4/0x1140 [ 318.094367][T10555] ? compat_writev+0x3c0/0x3c0 [ 318.099369][T10555] ? vfs_write+0x422/0x4e0 [ 318.103757][T10555] ? check_preemption_disabled+0x154/0x330 [ 318.109540][T10555] __x64_sys_sendfile64+0x1c4/0x220 [ 318.114710][T10555] ? __ia32_sys_sendfile+0x240/0x240 [ 318.119967][T10555] do_syscall_64+0xcb/0x1e0 [ 318.124441][T10555] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.130394][T10555] RIP: 0033:0x4665d9 [ 318.134274][T10555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.153854][T10555] RSP: 002b:00007f659793b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 318.162324][T10555] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 318.170267][T10555] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 318.178214][T10555] RBP: 00007f659793b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 318.186176][T10555] R10: 0800000080004103 R11: 0000000000000246 R12: 0000000000000001 [ 318.194118][T10555] R13: 00007ffd7fd0b6ff R14: 00007f659793b300 R15: 0000000000022000 02:58:52 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:58:52 executing program 2 (fault-call:3 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:52 executing program 3 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:58:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYBLOB="0200000000000000050000000000080000040000000008000000000000000900000000000001d4e83b5dfcf82723613735e30000000400000040000000ff7f0000000000090000000000400058470000000000000800000000000000080000000045aced075300"]) r5 = signalfd4(r0, 0x0, 0x0, 0x80000) sendfile(r5, r1, &(0x7f00000002c0)=0x7fffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000004c0)={[], 0x0, 0x2d1246}) r6 = fcntl$dupfd(r4, 0x0, r1) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:58:52 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 318.409679][T10572] FAULT_INJECTION: forcing a failure. [ 318.409679][T10572] name failslab, interval 1, probability 0, space 0, times 0 [ 318.439796][T10572] CPU: 0 PID: 10572 Comm: syz-executor.2 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 318.450072][T10572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.450075][T10572] Call Trace: [ 318.450090][T10572] dump_stack+0x1d8/0x24e [ 318.450098][T10572] ? devkmsg_release+0x11c/0x11c 02:58:52 executing program 2 (fault-call:3 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 318.450104][T10572] ? show_regs_print_info+0x12/0x12 [ 318.450114][T10572] should_fail+0x6f6/0x860 [ 318.450121][T10572] ? setup_fault_attr+0x3d0/0x3d0 [ 318.450131][T10572] ? netlink_sendmsg+0x748/0xd40 [ 318.450138][T10572] should_failslab+0x5/0x20 [ 318.450146][T10572] __kmalloc_track_caller+0x5d/0x2e0 [ 318.450152][T10572] ? kmem_cache_alloc+0x115/0x290 [ 318.450159][T10572] ? netlink_sendmsg+0x748/0xd40 [ 318.450165][T10572] __alloc_skb+0xaf/0x4d0 [ 318.450171][T10572] ? netlink_autobind+0x163/0x190 [ 318.450177][T10572] netlink_sendmsg+0x748/0xd40 [ 318.450185][T10572] ? netlink_getsockopt+0x8e0/0x8e0 02:58:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:52 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x2, 0x0) 02:58:52 executing program 2 (fault-call:3 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 318.450191][T10572] ? import_iovec+0x1bc/0x380 [ 318.450198][T10572] ? security_socket_sendmsg+0x9d/0xb0 [ 318.450204][T10572] ? netlink_getsockopt+0x8e0/0x8e0 [ 318.450209][T10572] ____sys_sendmsg+0x583/0x8c0 [ 318.450215][T10572] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 318.450221][T10572] ? __lru_cache_add+0x1c4/0x210 [ 318.450227][T10572] ? proc_fail_nth_read+0x1c0/0x1c0 [ 318.450233][T10572] __sys_sendmsg+0x2c4/0x3b0 [ 318.450238][T10572] ? ____sys_sendmsg+0x8c0/0x8c0 [ 318.450243][T10572] ? check_preemption_disabled+0x9e/0x330 [ 318.450253][T10572] ? fput_many+0x42/0x1a0 [ 318.450258][T10572] ? check_preemption_disabled+0x154/0x330 02:58:52 executing program 2 (fault-call:3 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 318.450271][T10572] do_syscall_64+0xcb/0x1e0 02:58:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 318.450278][T10572] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.450283][T10572] RIP: 0033:0x4665d9 [ 318.450291][T10572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.450294][T10572] RSP: 002b:00007eff6ff80188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.450301][T10572] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 318.450305][T10572] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 318.450309][T10572] RBP: 00007eff6ff801d0 R08: 0000000000000000 R09: 0000000000000000 [ 318.450312][T10572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.450316][T10572] R13: 00007ffce586181f R14: 00007eff6ff80300 R15: 0000000000022000 [ 318.585485][T10583] FAULT_INJECTION: forcing a failure. [ 318.585485][T10583] name failslab, interval 1, probability 0, space 0, times 0 [ 318.585496][T10583] CPU: 1 PID: 10583 Comm: syz-executor.2 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 318.585500][T10583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.585503][T10583] Call Trace: [ 318.585517][T10583] dump_stack+0x1d8/0x24e [ 318.585526][T10583] ? devkmsg_release+0x11c/0x11c [ 318.585534][T10583] ? show_regs_print_info+0x12/0x12 [ 318.585544][T10583] ? preempt_count_add+0x66/0x130 [ 318.585554][T10583] should_fail+0x6f6/0x860 [ 318.585562][T10583] ? setup_fault_attr+0x3d0/0x3d0 [ 318.585569][T10583] ? unwind_next_frame+0x1f0a/0x27b0 [ 318.585576][T10583] ? memset+0x1f/0x40 [ 318.585585][T10583] ? rtnl_newlink+0xff/0x1ce0 [ 318.585593][T10583] should_failslab+0x5/0x20 [ 318.585601][T10583] kmem_cache_alloc_trace+0x39/0x2b0 [ 318.585609][T10583] rtnl_newlink+0xff/0x1ce0 [ 318.585617][T10583] ? preempt_count_add+0x66/0x130 [ 318.585623][T10583] ? unwind_next_frame+0x1f0a/0x27b0 [ 318.585651][T10583] ? rtnl_setlink+0x4e0/0x4e0 [ 318.585659][T10583] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 318.585666][T10583] ? stack_trace_save+0x120/0x1f0 [ 318.585673][T10583] ? memset+0x1f/0x40 [ 318.585678][T10583] ? unwind_next_frame+0x1f0a/0x27b0 [ 318.585687][T10583] ? __rcu_read_lock+0x50/0x50 [ 318.585695][T10583] ? __rcu_read_lock+0x50/0x50 [ 318.585702][T10583] ? avc_has_perm_noaudit+0x37d/0x400 [ 318.585709][T10583] ? avc_has_perm_noaudit+0x37d/0x400 [ 318.585716][T10583] ? avc_has_perm_noaudit+0x30c/0x400 [ 318.585735][T10583] ? avc_denied+0x1c0/0x1c0 [ 318.585746][T10583] ? cred_has_capability+0x1b5/0x420 [ 318.585763][T10583] ? cred_has_capability+0x2ca/0x420 [ 318.585773][T10583] ? selinux_perf_event_write+0x100/0x100 [ 318.585783][T10583] ? cap_capable+0x23f/0x280 [ 318.585789][T10583] ? cap_capable+0x23f/0x280 [ 318.585798][T10583] ? mutex_lock+0xa6/0x110 [ 318.585806][T10583] ? mutex_trylock+0xb0/0xb0 [ 318.585813][T10583] ? security_capable+0xb1/0xd0 [ 318.585822][T10583] ? rtnl_setlink+0x4e0/0x4e0 [ 318.585829][T10583] rtnetlink_rcv_msg+0xb74/0xd00 [ 318.585838][T10583] ? unwind_get_return_address+0x48/0x80 [ 318.585845][T10583] ? rtnetlink_bind+0x80/0x80 [ 318.585852][T10583] ? arch_stack_walk+0xf8/0x140 [ 318.585861][T10583] ? stack_trace_save+0x120/0x1f0 [ 318.585868][T10583] ? stack_trace_snprint+0x150/0x150 [ 318.585875][T10583] ? check_preemption_disabled+0x9e/0x330 [ 318.585882][T10583] ? _raw_spin_lock_bh+0xa3/0x1b0 [ 318.585890][T10583] ? rhashtable_jhash2+0x1bf/0x2e0 [ 318.585897][T10583] ? jhash+0x740/0x740 [ 318.585906][T10583] ? rht_key_hashfn+0x112/0x1e0 [ 318.585913][T10583] ? rht_lock+0x100/0x100 [ 318.585920][T10583] ? __sys_sendmsg+0x2c4/0x3b0 [ 318.585927][T10583] ? rht_key_hashfn+0x1e0/0x1e0 [ 318.585935][T10583] ? netlink_hash+0xd0/0xd0 [ 318.585942][T10583] ? __rcu_read_lock+0x50/0x50 [ 318.585951][T10583] netlink_rcv_skb+0x200/0x480 [ 318.585960][T10583] ? rtnetlink_bind+0x80/0x80 [ 318.585967][T10583] ? netlink_ack+0xab0/0xab0 [ 318.585974][T10583] ? __rcu_read_lock+0x50/0x50 [ 318.585981][T10583] ? selinux_vm_enough_memory+0x170/0x170 [ 318.585990][T10583] netlink_unicast+0x865/0x9f0 [ 318.585999][T10583] ? netlink_detachskb+0x40/0x40 [ 318.586006][T10583] ? _copy_from_iter_full+0x29e/0x830 [ 318.586013][T10583] ? __virt_addr_valid+0x1fd/0x290 [ 318.586021][T10583] netlink_sendmsg+0x9ab/0xd40 [ 318.586032][T10583] ? netlink_getsockopt+0x8e0/0x8e0 [ 318.586039][T10583] ? import_iovec+0x1bc/0x380 [ 318.586047][T10583] ? security_socket_sendmsg+0x9d/0xb0 [ 318.586055][T10583] ? netlink_getsockopt+0x8e0/0x8e0 [ 318.586061][T10583] ____sys_sendmsg+0x583/0x8c0 [ 318.586070][T10583] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 318.586077][T10583] ? __lru_cache_add+0x1c4/0x210 [ 318.586085][T10583] ? proc_fail_nth_read+0x1c0/0x1c0 [ 318.586093][T10583] __sys_sendmsg+0x2c4/0x3b0 [ 318.586100][T10583] ? ____sys_sendmsg+0x8c0/0x8c0 [ 318.586107][T10583] ? check_preemption_disabled+0x9e/0x330 [ 318.586119][T10583] ? fput_many+0x42/0x1a0 [ 318.586126][T10583] ? check_preemption_disabled+0x154/0x330 [ 318.586138][T10583] do_syscall_64+0xcb/0x1e0 [ 318.586146][T10583] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.586152][T10583] RIP: 0033:0x4665d9 [ 318.586159][T10583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.586163][T10583] RSP: 002b:00007eff6ff80188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.586171][T10583] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 318.586176][T10583] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 318.586181][T10583] RBP: 00007eff6ff801d0 R08: 0000000000000000 R09: 0000000000000000 [ 318.586185][T10583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.586191][T10583] R13: 00007ffce586181f R14: 00007eff6ff80300 R15: 0000000000022000 [ 318.773758][T10591] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 318.773776][T10591] FAULT_INJECTION: forcing a failure. [ 318.773776][T10591] name failslab, interval 1, probability 0, space 0, times 0 [ 318.773784][T10591] CPU: 1 PID: 10591 Comm: syz-executor.2 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 318.773788][T10591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.773791][T10591] Call Trace: [ 318.773804][T10591] dump_stack+0x1d8/0x24e [ 318.773813][T10591] ? devkmsg_release+0x11c/0x11c [ 318.773821][T10591] ? show_regs_print_info+0x12/0x12 [ 318.773829][T10591] ? rtnetlink_rcv_msg+0xbc0/0xd00 [ 318.773839][T10591] should_fail+0x6f6/0x860 [ 318.773846][T10591] ? setup_fault_attr+0x3d0/0x3d0 [ 318.773855][T10591] ? __alloc_skb+0x75/0x4d0 [ 318.773862][T10591] should_failslab+0x5/0x20 [ 318.773869][T10591] kmem_cache_alloc+0x36/0x290 [ 318.773875][T10591] ? stack_trace_snprint+0x150/0x150 [ 318.773881][T10591] __alloc_skb+0x75/0x4d0 [ 318.773888][T10591] ? _raw_spin_lock_bh+0xa3/0x1b0 [ 318.773896][T10591] netlink_ack+0x2c9/0xab0 [ 318.773904][T10591] ? rht_lock+0x100/0x100 [ 318.773909][T10591] ? __sys_sendmsg+0x2c4/0x3b0 [ 318.773915][T10591] ? netlink_dump+0x12d0/0x12d0 [ 318.773922][T10591] ? __rcu_read_lock+0x50/0x50 [ 318.773929][T10591] netlink_rcv_skb+0x299/0x480 [ 318.773936][T10591] ? rtnetlink_bind+0x80/0x80 [ 318.773944][T10591] ? netlink_ack+0xab0/0xab0 [ 318.773951][T10591] ? __rcu_read_lock+0x50/0x50 [ 318.773985][T10591] ? selinux_vm_enough_memory+0x170/0x170 [ 318.773995][T10591] netlink_unicast+0x865/0x9f0 [ 318.774005][T10591] ? netlink_detachskb+0x40/0x40 [ 318.774013][T10591] ? _copy_from_iter_full+0x29e/0x830 [ 318.774023][T10591] ? __virt_addr_valid+0x1fd/0x290 [ 318.774032][T10591] netlink_sendmsg+0x9ab/0xd40 [ 318.774044][T10591] ? netlink_getsockopt+0x8e0/0x8e0 [ 318.774054][T10591] ? security_socket_sendmsg+0x9d/0xb0 [ 318.774062][T10591] ? netlink_getsockopt+0x8e0/0x8e0 [ 318.774068][T10591] ____sys_sendmsg+0x583/0x8c0 [ 318.774077][T10591] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 318.774089][T10591] ? __lru_cache_add+0x1c4/0x210 [ 318.774098][T10591] ? proc_fail_nth_read+0x1c0/0x1c0 [ 318.774106][T10591] __sys_sendmsg+0x2c4/0x3b0 [ 318.774114][T10591] ? ____sys_sendmsg+0x8c0/0x8c0 [ 318.774121][T10591] ? check_preemption_disabled+0x9e/0x330 [ 318.774134][T10591] ? fput_many+0x42/0x1a0 [ 318.774140][T10591] ? check_preemption_disabled+0x154/0x330 [ 318.774151][T10591] do_syscall_64+0xcb/0x1e0 [ 318.774160][T10591] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.774167][T10591] RIP: 0033:0x4665d9 [ 318.774175][T10591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.774179][T10591] RSP: 002b:00007eff6ff80188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.774187][T10591] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 318.774191][T10591] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 318.774196][T10591] RBP: 00007eff6ff801d0 R08: 0000000000000000 R09: 0000000000000000 [ 318.774200][T10591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.774205][T10591] R13: 00007ffce586181f R14: 00007eff6ff80300 R15: 0000000000022000 [ 318.818399][T10596] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 318.818423][T10596] FAULT_INJECTION: forcing a failure. [ 318.818423][T10596] name failslab, interval 1, probability 0, space 0, times 0 [ 318.818433][T10596] CPU: 0 PID: 10596 Comm: syz-executor.2 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 318.818438][T10596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.818441][T10596] Call Trace: [ 318.818455][T10596] dump_stack+0x1d8/0x24e [ 318.818466][T10596] ? devkmsg_release+0x11c/0x11c [ 318.818476][T10596] ? show_regs_print_info+0x12/0x12 [ 318.818487][T10596] should_fail+0x6f6/0x860 [ 318.818496][T10596] ? setup_fault_attr+0x3d0/0x3d0 [ 318.818508][T10596] ? netlink_ack+0x2c9/0xab0 [ 318.818517][T10596] should_failslab+0x5/0x20 [ 318.818527][T10596] __kmalloc_track_caller+0x5d/0x2e0 [ 318.818535][T10596] ? kmem_cache_alloc+0x115/0x290 [ 318.818543][T10596] ? netlink_ack+0x2c9/0xab0 [ 318.818551][T10596] __alloc_skb+0xaf/0x4d0 [ 318.818559][T10596] ? _raw_spin_lock_bh+0xa3/0x1b0 [ 318.818568][T10596] netlink_ack+0x2c9/0xab0 [ 318.818578][T10596] ? rht_lock+0x100/0x100 [ 318.818585][T10596] ? __sys_sendmsg+0x2c4/0x3b0 [ 318.818594][T10596] ? netlink_dump+0x12d0/0x12d0 [ 318.818602][T10596] ? __rcu_read_lock+0x50/0x50 [ 318.818612][T10596] netlink_rcv_skb+0x299/0x480 [ 318.818620][T10596] ? rtnetlink_bind+0x80/0x80 [ 318.818629][T10596] ? netlink_ack+0xab0/0xab0 [ 318.818637][T10596] ? __rcu_read_lock+0x50/0x50 [ 318.818645][T10596] ? selinux_vm_enough_memory+0x170/0x170 [ 318.818655][T10596] netlink_unicast+0x865/0x9f0 [ 318.818666][T10596] ? netlink_detachskb+0x40/0x40 [ 318.818674][T10596] ? _copy_from_iter_full+0x29e/0x830 [ 318.818682][T10596] ? __virt_addr_valid+0x1fd/0x290 [ 318.818693][T10596] netlink_sendmsg+0x9ab/0xd40 [ 318.818704][T10596] ? netlink_getsockopt+0x8e0/0x8e0 [ 318.818712][T10596] ? import_iovec+0x1bc/0x380 [ 318.818732][T10596] ? security_socket_sendmsg+0x9d/0xb0 [ 318.818741][T10596] ? netlink_getsockopt+0x8e0/0x8e0 [ 318.818749][T10596] ____sys_sendmsg+0x583/0x8c0 [ 318.818758][T10596] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 318.818767][T10596] ? __lru_cache_add+0x1c4/0x210 [ 318.818776][T10596] ? proc_fail_nth_read+0x1c0/0x1c0 [ 318.818785][T10596] __sys_sendmsg+0x2c4/0x3b0 [ 318.818793][T10596] ? ____sys_sendmsg+0x8c0/0x8c0 [ 318.818801][T10596] ? check_preemption_disabled+0x9e/0x330 [ 318.818813][T10596] ? fput_many+0x42/0x1a0 [ 318.818820][T10596] ? check_preemption_disabled+0x154/0x330 [ 318.818833][T10596] do_syscall_64+0xcb/0x1e0 [ 318.818842][T10596] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.818849][T10596] RIP: 0033:0x4665d9 [ 318.818857][T10596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.818862][T10596] RSP: 002b:00007eff6ff80188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.818871][T10596] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 318.818876][T10596] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 318.818880][T10596] RBP: 00007eff6ff801d0 R08: 0000000000000000 R09: 0000000000000000 [ 318.818885][T10596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.818890][T10596] R13: 00007ffce586181f R14: 00007eff6ff80300 R15: 0000000000022000 [ 318.901613][ T91] device bridge_slave_1 left promiscuous mode [ 318.901690][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.881487][T10606] cgroup1: Unknown subsys name 'perf_event' [ 320.072818][ T91] device bridge_slave_0 left promiscuous mode [ 320.072890][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.079311][T10606] cgroup1: Unknown subsys name 'net_cls' [ 320.214431][T10606] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.221468][T10606] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.229855][T10606] device bridge_slave_0 entered promiscuous mode [ 320.236981][T10606] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.244040][T10606] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.251460][T10606] device bridge_slave_1 entered promiscuous mode [ 320.289438][T10606] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.296497][T10606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.303772][T10606] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.310777][T10606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.331007][ T1797] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.338225][ T1797] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.346463][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.354198][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.364113][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.372205][ T150] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.379328][ T150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.394261][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.402639][ T1797] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.409762][ T1797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.417432][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.426167][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.440964][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 320.453748][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.472812][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 320.481691][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 320.491007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:58:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x47, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb12"}, 0x50, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:54 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x4, 0x0) 02:58:54 executing program 2 (fault-call:3 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:54 executing program 0 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:58:54 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x7ffff000) [ 320.531745][T10613] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.539163][T10613] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x48, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125a"}, 0x51, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 320.589016][T10619] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 320.595533][T10620] FAULT_INJECTION: forcing a failure. [ 320.595533][T10620] name failslab, interval 1, probability 0, space 0, times 0 02:58:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:54 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x4000, 0x0) [ 320.640025][T10629] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 320.646769][T10620] CPU: 1 PID: 10620 Comm: syz-executor.0 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 320.661803][T10620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.671985][T10620] Call Trace: [ 320.672002][T10620] dump_stack+0x1d8/0x24e 02:58:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 320.672012][T10620] ? devkmsg_release+0x11c/0x11c [ 320.672021][T10620] ? show_regs_print_info+0x12/0x12 [ 320.672031][T10620] should_fail+0x6f6/0x860 02:58:54 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x1000000, 0x0) 02:58:54 executing program 0 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:58:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 320.672040][T10620] ? setup_fault_attr+0x3d0/0x3d0 [ 320.672049][T10620] ? __kernel_write+0x340/0x340 [ 320.672057][T10620] ? check_preemption_disabled+0x9e/0x330 02:58:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 320.672065][T10620] ? getname_flags+0xba/0x640 [ 320.672074][T10620] should_failslab+0x5/0x20 [ 320.672083][T10620] kmem_cache_alloc+0x36/0x290 [ 320.672091][T10620] ? __fsnotify_parent+0x310/0x310 [ 320.672098][T10620] getname_flags+0xba/0x640 [ 320.672107][T10620] user_path_at_empty+0x28/0x50 [ 320.672170][T10620] path_setxattr+0xad/0x240 [ 320.672177][T10620] ? fput_many+0x42/0x1a0 [ 320.672184][T10620] ? check_preemption_disabled+0x154/0x330 [ 320.672193][T10620] ? simple_xattr_list_add+0xf0/0xf0 [ 320.672200][T10620] ? __ia32_sys_read+0x80/0x80 [ 320.672209][T10620] __x64_sys_lsetxattr+0xb4/0xd0 [ 320.672217][T10620] do_syscall_64+0xcb/0x1e0 [ 320.672226][T10620] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 320.672234][T10620] RIP: 0033:0x4665d9 [ 320.672242][T10620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.672246][T10620] RSP: 002b:00007f9ee8700188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 320.672255][T10620] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 320.672260][T10620] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 320.672264][T10620] RBP: 00007f9ee87001d0 R08: 0000000000000000 R09: 0000000000000000 [ 320.672269][T10620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.672274][T10620] R13: 00007fffba227eaf R14: 00007f9ee8700300 R15: 0000000000022000 [ 320.696148][T10633] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:55 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:58:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x48, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125a"}, 0x51, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:55 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004102) 02:58:55 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x2000000, 0x0) 02:58:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 320.764327][T10643] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 320.828977][T10655] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:55 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x4000000, 0x0) [ 321.064770][T10671] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:55 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x2, 0x0) 02:58:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:55 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004104) 02:58:55 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x40000000, 0x0) [ 321.165168][T10687] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 321.224786][ T91] device bridge_slave_1 left promiscuous mode [ 321.231219][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.263485][ T91] device bridge_slave_0 left promiscuous mode [ 321.280519][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.570096][T10704] cgroup1: Unknown subsys name 'perf_event' [ 322.576757][T10704] cgroup1: Unknown subsys name 'net_cls' [ 322.614162][T10704] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.621201][T10704] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.628977][T10704] device bridge_slave_0 entered promiscuous mode [ 322.636091][T10704] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.643210][T10704] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.650783][T10704] device bridge_slave_1 entered promiscuous mode [ 322.687777][T10704] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.694979][T10704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.702320][T10704] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.709361][T10704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.729736][ T2081] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.737118][ T2081] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.745281][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.752756][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.764308][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.772511][ T2081] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.779556][ T2081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.787324][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.795571][ T2081] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.802695][ T2081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.824529][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.833246][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.842223][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.850492][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.863700][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.879833][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.888333][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:58:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x48, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125a"}, 0x51, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:57 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x4, 0x0) 02:58:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x8cffffff, 0x0) 02:58:57 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) [ 322.929248][T10710] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.936616][T10710] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:57 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x4000, 0x0) 02:58:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0xf6ffffff, 0x0) 02:58:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 323.003374][T10721] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1f00, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0xffffff8c, 0x0) 02:58:57 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x1000000, 0x0) 02:58:57 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0xfffffff6, 0x0) 02:58:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x8, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004106) 02:58:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x2000000, 0x0) 02:58:57 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x100000000000000, 0x0) 02:58:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:57 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x4000000, 0x0) 02:58:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x200000000000000, 0x0) 02:58:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xa, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004107) 02:58:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x8100, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xb, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x34000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:57 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x400000000000000, 0x0) 02:58:57 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x40000000, 0x0) 02:58:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 323.494569][ T7] device bridge_slave_1 left promiscuous mode [ 323.501099][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.525749][ T7] device bridge_slave_0 left promiscuous mode [ 323.531923][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.792480][T10814] cgroup1: Unknown subsys name 'perf_event' [ 324.798766][T10814] cgroup1: Unknown subsys name 'net_cls' [ 324.835905][T10814] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.843091][T10814] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.850959][T10814] device bridge_slave_0 entered promiscuous mode [ 324.858351][T10814] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.865675][T10814] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.873350][T10814] device bridge_slave_1 entered promiscuous mode [ 324.909168][T10814] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.916232][T10814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.923515][T10814] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.930885][T10814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.951202][ T2023] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.958557][ T2023] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.966855][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 324.974764][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.984144][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.992412][ T2081] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.999506][ T2081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.013853][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.021964][ T2023] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.029017][ T2023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.036795][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.044811][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.063343][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 325.071639][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 325.082515][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 325.095306][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 325.107387][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:58:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x400300, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x4000000000000000, 0x0) 02:58:59 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004108) 02:58:59 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x8cffffff, 0x0) 02:58:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xd, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 325.150924][T10820] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.158174][T10820] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:59 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x8cffffff00000000, 0x0) 02:58:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:59 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0xf6ffffff, 0x0) [ 325.217774][T10830] __nla_validate_parse: 6 callbacks suppressed [ 325.217780][T10830] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xe, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0xf6ffffff00000000, 0x0) 02:58:59 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004109) 02:58:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0xffffff8c, 0x0) 02:58:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0xffffffff00000000, 0x0) [ 325.356327][T10852] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x80000008000410a) 02:58:59 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0xfffffff6, 0x0) 02:58:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:58:59 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x2) [ 325.463653][T10869] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x100000000000000, 0x0) 02:58:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x11, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x80000008000410b) 02:58:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x4) 02:58:59 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x200000000000000, 0x0) [ 325.585770][T10891] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x12, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x9000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:58:59 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x4000) [ 325.709107][T10910] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 325.743590][ T7] device bridge_slave_1 left promiscuous mode [ 325.743681][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.743950][ T7] device bridge_slave_0 left promiscuous mode [ 325.744005][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.082597][T10923] cgroup1: Unknown subsys name 'perf_event' [ 327.089155][T10923] cgroup1: Unknown subsys name 'net_cls' [ 327.126371][T10923] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.133874][T10923] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.141229][T10923] device bridge_slave_0 entered promiscuous mode [ 327.148516][T10923] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.155958][T10923] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.163656][T10923] device bridge_slave_1 entered promiscuous mode [ 327.200523][T10923] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.207768][T10923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.215202][T10923] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.222663][T10923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.243458][ T1797] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.250967][ T1797] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.258954][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 327.267610][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 327.283526][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.291748][ T1797] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.298809][ T1797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.306480][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.314849][ T1797] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.321861][ T1797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.329199][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.337215][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.351161][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 327.363397][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.376538][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 327.391723][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 02:59:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:01 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x400000000000000, 0x0) 02:59:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x25, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x10000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:01 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x1000000) 02:59:01 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x80000008000410c) [ 327.400366][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1f000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:01 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x4000000000000000, 0x0) 02:59:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:01 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x2000000) [ 327.462103][T10936] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x48, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:01 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x80000008000410d) 02:59:01 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x8cffffff00000000, 0x0) 02:59:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x20000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:01 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x4000000) [ 327.585801][T10956] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x40000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:01 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0xf6ffffff00000000, 0x0) 02:59:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:01 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x40000000) 02:59:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x81000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 327.682565][T10975] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x68, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:01 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0xffffffff00000000, 0x0) 02:59:01 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x80000008000410e) 02:59:01 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x8cffffff) 02:59:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x81ffffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 327.783458][T10989] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:01 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x2) 02:59:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6c, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x9effffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:02 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0xf6ffffff) [ 327.906781][T11006] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 328.003769][ T7] device bridge_slave_1 left promiscuous mode [ 328.011183][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.040619][ T7] device bridge_slave_0 left promiscuous mode [ 328.050561][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.265615][T11016] cgroup1: Unknown subsys name 'perf_event' [ 329.272081][T11016] cgroup1: Unknown subsys name 'net_cls' [ 329.309014][T11016] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.316228][T11016] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.323970][T11016] device bridge_slave_0 entered promiscuous mode [ 329.330858][T11016] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.338479][T11016] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.346024][T11016] device bridge_slave_1 entered promiscuous mode [ 329.382032][T11016] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.389088][T11016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.396403][T11016] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.404316][T11016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.424986][ T150] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.432332][ T150] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.440221][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 329.448404][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.463375][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 329.471545][ T150] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.478593][ T150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.487089][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 329.495462][ T150] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.502565][ T150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.509951][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 329.519550][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 329.534345][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 329.553516][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.561387][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 329.576354][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 02:59:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:03 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x4) 02:59:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xeaffffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x74, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:03 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0xffffff8c) 02:59:03 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004110) [ 329.585345][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:03 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0xfffffff6) 02:59:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7a, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xefffffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:03 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x4000) 02:59:03 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004111) 02:59:03 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x100000000000000) 02:59:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xf0ffffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x18c, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:03 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x1000000) 02:59:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfeffffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:03 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x200000000000000) 02:59:04 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004112) 02:59:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:04 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x400000000000000) 02:59:04 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x2000000) 02:59:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffff81, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:04 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x4000000000000000) 02:59:04 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x4000000) 02:59:04 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x80000008000412e) 02:59:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 330.133191][ T7] device bridge_slave_1 left promiscuous mode [ 330.142934][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.168620][ T7] device bridge_slave_0 left promiscuous mode [ 330.168678][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.287514][T11106] __nla_validate_parse: 5 callbacks suppressed [ 330.287520][T11106] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 331.518492][T11116] cgroup1: Unknown subsys name 'perf_event' [ 331.525218][T11116] cgroup1: Unknown subsys name 'net_cls' [ 331.561873][T11116] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.569113][T11116] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.576966][T11116] device bridge_slave_0 entered promiscuous mode [ 331.584203][T11116] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.591219][T11116] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.599028][T11116] device bridge_slave_1 entered promiscuous mode [ 331.635413][T11116] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.642860][T11116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.650106][T11116] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.657150][T11116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.677447][ T2023] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.684795][ T2023] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.692068][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.700536][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.710013][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.718270][ T150] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.725648][ T150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.743280][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.751418][ T2023] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.758493][ T2023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.765929][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.773952][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.792762][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 331.801350][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.809577][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 331.824284][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 02:59:05 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x40000000) 02:59:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffff9e, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:05 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x8cffffff00000000) 02:59:05 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004164) 02:59:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 331.836480][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x700, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffea, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 331.906541][T11129] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:06 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x8cffffff) 02:59:06 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0xffffffffffffffff) 02:59:06 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0xf6ffffff00000000) 02:59:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffef, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:06 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0xf6ffffff) 02:59:06 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0xffffffff00000000) 02:59:06 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x137) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mountinfo\x00') sendfile(r0, r2, 0x0, 0x800000080004103) [ 332.027008][T11149] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xa00, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfffffff0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 332.166026][T11171] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 332.382679][ T7] device bridge_slave_1 left promiscuous mode [ 332.388951][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.412743][ T7] device bridge_slave_0 left promiscuous mode [ 332.418922][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.544707][T11179] cgroup1: Unknown subsys name 'perf_event' [ 333.550820][T11179] cgroup1: Unknown subsys name 'net_cls' [ 333.587318][T11179] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.594761][T11179] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.602066][T11179] device bridge_slave_0 entered promiscuous mode [ 333.609908][T11179] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.617350][T11179] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.625073][T11179] device bridge_slave_1 entered promiscuous mode [ 333.674498][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.682008][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.693134][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.701401][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.710567][ T2025] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.717726][ T2025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.725729][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.734201][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.742478][ T2025] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.749613][ T2025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.757232][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.770122][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.779864][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.794758][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.813519][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 02:59:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:07 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x2040c00, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', '@-*&(^.}\x00'}, &(0x7f0000000100)=""/176, 0xb0) sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:07 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x600000, 0x3) mkdir(&(0x7f0000000040)='./file0\x00', 0x8) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2a0000, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x20}}, {@mode={'mode', 0x3d, 0xffffffffffffc9cc}}], [{@smackfsroot={'smackfsroot', 0x3d, '):'}}]}) 02:59:07 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0xffffff8c) 02:59:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfffffffe, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xb00, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 333.821950][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.835545][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.843842][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0xf, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xc00, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:08 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 333.909703][T11192] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:08 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:08 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0xfffffff6) 02:59:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xd00, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 333.980763][T11203] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x10, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xe00, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:08 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x100000000000000) 02:59:08 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x6) chdir(&(0x7f0000000000)='./file0\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0xc0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 334.073482][T11219] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0xec0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:08 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x200000000000000) 02:59:08 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x170) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 334.167686][T11232] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:08 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x87) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x14, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x20042001}, 0x4050) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1100, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x33fe0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:08 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x400000000000000) [ 334.298584][T11251] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 334.314006][T11250] incfs: Error accessing: ./file0. [ 334.329282][T11253] incfs: Error accessing: ./file0. [ 334.412772][ T420] device bridge_slave_1 left promiscuous mode [ 334.418966][ T420] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.442916][ T420] device bridge_slave_0 left promiscuous mode [ 334.452348][ T420] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.695138][T11267] cgroup1: Unknown subsys name 'perf_event' [ 335.701411][T11267] cgroup1: Unknown subsys name 'net_cls' [ 335.738063][T11267] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.745446][T11267] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.753237][T11267] device bridge_slave_0 entered promiscuous mode [ 335.760327][T11267] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.767583][T11267] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.775315][T11267] device bridge_slave_1 entered promiscuous mode [ 335.812063][T11267] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.819330][T11267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.826675][T11267] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.833751][T11267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.853845][ T1797] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.861218][ T1797] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.870361][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 335.878310][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 335.902904][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 335.911216][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.919336][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.928087][ T1797] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.935137][ T1797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.943187][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.951309][ T1797] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.958352][ T1797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.965720][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 335.973946][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 335.986503][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:59:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1200, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:10 executing program 3: ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/186) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x40) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x2000015, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x3) 02:59:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20000178, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:10 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000180)) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) 02:59:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:10 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x4000000000000000) [ 336.001660][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 336.010874][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:10 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x8cffffff00000000) 02:59:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x200001b8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2500, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 336.083772][T11284] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:10 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x40028, &(0x7f0000000100)={[{@metacopy_off}, {@metacopy_on}, {@default_permissions}, {@default_permissions}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@nfs_export_on}], [{@fsname}]}) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0xb8) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x40001, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x7ffff000, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:10 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000006c0)=0x4) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f00000005c0)=0x1ff) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)="276b1ccb910d51ca5916dfb8d11ecd0a55511a394df40976a61a5d08", 0x1c}, {&(0x7f0000000240)="8b1f17ce6cd2fcac5d209d3743c573bb98e0cf1b16fd4d70b97212aeadfe9bb27f8e0152dfb1c317b7e3f312bc66f2692bde79027cb7a2919f4470b39d6d3c572c093a4c47421dc4347f2378cc73b137998791a7e3072043e8edc27e415f32191a7e3f574cdc9a9acab6709403f0f43b8c5ef12f9a0ff3da3e89a848d145b77165c54cf249307d7b7b82648f2c9b84cb553d5304625859e7664f5d11124f5d2933a49c9627afe54ef877f0b0586b443c5469c8c2af7b029a768a76bc3f07cb3bc49e0b0508c515c62f83efc7", 0xcc}, {&(0x7f0000000340)="d310eb522df9fd179d27695ddebd3f16f840ce5aae23715027edc5d02642646868211aee23c41ba9dfaa0f7c7d69a43d816f59e098cbea0975438cca6ae37495dc659269e3d1990975ac230dc9def96ec65e35a5cb47f3f32d6f8b98ce408b9ac287430cd4e2d962b5f6d50849bf4e2f44c28f82d05821bbec18555185510749db88a251007f01fa9ce741049dd094049300b0dac0a8f54a09d2f31b618f2486fb41407d7826f1778e", 0xa9}, {&(0x7f0000000400)="cad33dc4449cb696ab71b16b7bee128a971f249b1538b995511a46d5e8b5c2afcb0cf18954ad075be564f0ecb4d1bc4555596018b002a616f283f9725d0d8dd97fd75e2877a999a184b5fce61b25763ab8c329c9ae2caa434f69958d7616b3086f2d042417308f9dcf5ae490c1a601634a5c5ce5bb3c147132e84dcec66d4a7a8545952c05198042aabbc9f420927ba2eb78e95e48b513d88cd5b16da20d471fb0987c27b61381d5f3", 0xa9}, {&(0x7f0000000100)="980901e9153edce6cd5231642459008ee60cc78870e10b64b7e9f360d765f02a2d0f0cb4c01ade1b399913a9bb1d4c2b329332b25a7285d4d5faa071bdd27bad58bd8578486244509d74cfccf1bef566047ce5a1c9602ad6068942925d29e9082e72c5b86631c6a7ef2315b9126213420bc05fc528055b7bc71e7205dd9437", 0x7f}], 0x5, &(0x7f0000000540)=[@txtime={{0x18, 0x1, 0x3d, 0x3f}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x7ff}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x60}}], 0x1, 0x0) [ 336.144634][T11292] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:10 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r1 = accept4$bt_l2cap(r0, 0x0, &(0x7f0000000000), 0x0) sendfile(r0, r1, 0x0, 0x4) 02:59:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:10 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0xf6ffffff00000000) 02:59:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0xfffffdef, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:10 executing program 3: mkdir(&(0x7f0000000100)='./file0/file0\x00', 0xc2) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) umount2(&(0x7f0000000140)='./file0/file0\x00', 0x7) chroot(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x78) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x2) 02:59:10 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004103) openat(r3, &(0x7f0000000000)='./file0\x00', 0x422080, 0x40) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r4, r5, 0x0, 0x800000080004103) [ 336.252739][T11316] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:10 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 02:59:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x2, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4800, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:10 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0xffffffff00000000) 02:59:10 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x1104801, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}, {@allow_other}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1200}}, {@allow_other}], [{@smackfshat={'smackfshat', 0x3d, 'mountinfo\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '\x9b\'!%}\xb2,$'}}, {@obj_type={'obj_type', 0x3d, '&'}}]}}) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000100)=0x2, 0x4) [ 336.463840][T11341] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=11341 comm=syz-executor.5 [ 336.484573][T11343] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x3, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4c00, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:10 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:10 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xc0, &(0x7f0000000240)={[{@readahead={'readahead', 0x3d, 0xcf88}}, {@rlog_pages={'rlog_pages', 0x3d, 0x1000}}, {@read_timeout_ms={'read_timeout_ms', 0x3d, 0x2c8a}}, {@rlog_wakeup_cnt={'rlog_wakeup_cnt', 0x3d, 0x721}}, {@rlog_pages={'rlog_pages', 0x3d, 0x3}}], [{@uid_lt={'uid<', 0xee01}}, {@subj_role={'subj_role', 0x3d, 'system.posix_acl_default\x00'}}, {@euid_lt={'euid<', r1}}, {@fowner_lt}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@appraise}, {@hash}]}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:10 executing program 4: mkdir(&(0x7f0000000600)='./file1\x00', 0x6) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x240000, 0x30) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/8250', 0xa1317b85f5aa91a1, 0x71) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0/file0', [{0x20, ']]%:,-/&$.'}, {0x20, '-'}, {}, {0x20, '&$'}, {0x20, 'incremental-fs\x00'}, {}], 0xa, "018330b7e5373512e21a55440f9714b4e65964a3af6ed9a20d0de679e67c7c742197846543560dc7dff0c56fa8a4efc86f85d85789ab31c544d7d1516d9d019c078459d232a90fb072b01140c11e04228bec38c28e1069c40c00088a26640629"}, 0x93) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x20001, 0x108) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/43, 0x2b) sendfile(r0, r2, 0x0, 0x800000080004103) [ 336.607466][T11360] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=11360 comm=syz-executor.5 [ 336.621466][T11359] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 336.647460][ T420] device bridge_slave_1 left promiscuous mode 02:59:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6800, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 336.658143][ T420] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.666578][T11365] incfs: Options parsing error. -22 [ 336.699915][ T420] device bridge_slave_0 left promiscuous mode [ 336.707134][T11371] incfs: Options parsing error. -22 [ 336.727871][ T420] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.853647][T11373] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 338.176856][T11380] cgroup1: Unknown subsys name 'perf_event' [ 338.183137][T11380] cgroup1: Unknown subsys name 'net_cls' [ 338.219539][T11380] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.226765][T11380] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.234572][T11380] device bridge_slave_0 entered promiscuous mode [ 338.241538][T11380] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.248794][T11380] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.256423][T11380] device bridge_slave_1 entered promiscuous mode [ 338.292587][T11380] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.299622][T11380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.306910][T11380] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.314045][T11380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.335202][ T1797] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.342686][ T1797] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.350085][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.358132][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.367381][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.375599][ T150] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.382664][ T150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.392644][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.400874][ T1797] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.407921][ T1797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.422670][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.430707][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.452412][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.460906][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.469002][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.482107][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 338.490565][ T1797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 02:59:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x4, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:12 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x180020, &(0x7f0000000240)={[{@xino_auto}, {@nfs_export_on}, {@default_permissions}, {@nfs_export_off}, {@default_permissions}, {@xino_auto}], [{@uid_lt={'uid<', r1}}, {@uid_lt={'uid<', r2}}, {@subj_type={'subj_type', 0x3d, '\\-{'}}, {@subj_type={'subj_type', 0x3d, 'system.posix_acl_default\x00'}}]}) 02:59:12 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000140)='qnx6\x00', 0x20000, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file1\x00', 0x4000, 0x80, &(0x7f0000000240)) 02:59:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6c00, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:12 executing program 4: socketpair(0x2b, 0x80000, 0x7, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x99e}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002bbd7000ffdbdf257c00000008000300", @ANYRES32=r3, @ANYBLOB="0a000600fffffffffff547f45377f40000"], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x4000840) mkdir(&(0x7f0000000600)='./bus\x00', 0x1a4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r4, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x110c000, &(0x7f0000000240)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@index_on}, {@xino_auto}, {@upperdir={'upperdir', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_appraise}, {@fowner_eq={'fowner', 0x3d, r4}}, {@appraise_type}, {@uid_lt={'uid<', 0xee00}}, {@uid_lt={'uid<', 0xee00}}]}) mount$incfs(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000140), 0xf4005, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r5, r6, 0x0, 0x800000080004103) [ 338.537482][T11386] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.544941][T11386] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x5, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7400, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 338.607560][T11392] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 338.617962][T11396] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=11396 comm=syz-executor.5 02:59:12 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0xc000, &(0x7f0000000340)=ANY=[@ANYBLOB="78696e6f3d6175746f2c75707065726469723d2e2f66696c65302c6e66735f6578706f72743d6f66662c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65302c75707065726469723d2e2f66696c65302c6e66735f6578706f72743d6f6e2c736d61636b66736465663d5b5e2c6f626a5f726f6c653d696e6372656d656e74616c2d6673002c0096f384bcf1ab781bda9ebda5795f781ce86d9845b9af3e453c70d128fa6b593abc53bb832682723512739396d4e8422c29046bc00bb307c2e05653ab6818d57d3b4be439375526119dd4c2a518759d7169923f83d26fda23fc4602e0c0fc9e66"]) 02:59:12 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x40) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') 02:59:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x6, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 338.669970][T11405] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=11405 comm=syz-executor.5 02:59:12 executing program 4: socket(0x21, 0x803, 0xffffffff) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='statm\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7a00, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 338.725713][T11411] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 338.749111][T11416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=11416 comm=syz-executor.5 02:59:12 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', 0x0, 0x0, 0x3) 02:59:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 338.819859][T11426] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:12 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') fchmodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x2) pipe(&(0x7f0000000140)={0xffffffffffffffff}) openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x40000, 0x8) creat(&(0x7f0000000100)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x7, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x8100, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:13 executing program 3: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x66, 0x67d, 0x39, @private1={0xfc, 0x1, '\x00', 0x1}, @local, 0x80, 0x80, 0x5, 0x2}}) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000280)='.pending_reads\x00', 0x40000, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x10280}}, 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xfffffe35, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x1894b}}, 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'syztnl1\x00', &(0x7f00000002c0)={'ip6gre0\x00', r2, 0x2f, 0x9, 0x1, 0x5, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0x42}, 0x8000, 0x80, 0x3f, 0x200}}) mkdir(&(0x7f0000000600)='./file0\x00', 0x1b3) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x1020404, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0xd9) creat(&(0x7f00000000c0)='./file1\x00', 0x130) 02:59:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x8c01, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 338.934206][T11439] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=11439 comm=syz-executor.5 [ 338.957341][T11441] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:13 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) r2 = dup3(r1, r1, 0x80000) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @local}}, 0x0, 0x0, 0x43, 0x0, "dbb9a2c89f2464028687f457874c186039ed2bc89c2f5494f9d724ef520ba6bd0ae679ee087ab07530ade69a9618e8f8c3e29cece7f564445ccfd33ccc11abb984864e535d6baba5e5f4954a0a934e9d"}, 0xd8) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x800000080004103) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000340)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) chown(&(0x7f0000000180)='./file0\x00', r5, r6) sendmsg$ETHTOOL_MSG_EEE_GET(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 02:59:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x8, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 339.029887][T11450] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.059952][T11450] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.067039][T11450] bridge0: port 1(bridge_slave_0) entered forwarding state 02:59:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x34000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 339.085237][T11456] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=11456 comm=syz-executor.5 02:59:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x9, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x400300, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:13 executing program 3: timer_gettime(0x0, &(0x7f0000000280)) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0), 0x808000, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x808000, &(0x7f0000000100)=ANY=[@ANYBLOB='index=on,redirec\x00\x00\x00\x00r=./file0,smackfshat=,\x00']) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 339.162108][ T7] device bridge_slave_1 left promiscuous mode [ 339.178988][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.210598][ T7] device bridge_slave_0 left promiscuous mode [ 339.212622][T11470] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=11470 comm=syz-executor.5 [ 339.233125][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.254596][T11473] overlayfs: unrecognized mount option "redirec" or missing value [ 339.281124][T11477] overlayfs: unrecognized mount option "redirec" or missing value [ 339.321604][ T9404] incfs_lookup_dentry err:-2 [ 340.766133][T11482] cgroup1: Unknown subsys name 'perf_event' [ 340.772305][T11482] cgroup1: Unknown subsys name 'net_cls' [ 340.808993][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.816070][T11482] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.824000][T11482] device bridge_slave_0 entered promiscuous mode [ 340.830850][T11482] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.838368][T11482] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.846203][T11482] device bridge_slave_1 entered promiscuous mode [ 340.882876][T11482] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.889904][T11482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.897200][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.904249][T11482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.924876][ T2081] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.932343][ T2081] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.939637][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 340.947642][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.957610][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.965795][ T2025] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.972944][ T2025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.982234][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.990664][ T2081] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.997733][ T2081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.014883][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.023304][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.042695][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 341.051046][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.059609][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 341.075366][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 341.083943][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 02:59:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xa, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:15 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:15 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x1000004, &(0x7f0000000300)=ANY=[@ANYBLOB="78696e6f3d6f6e2c776f726b6469723dc50666696c302c6e66735fd96578706f72743d6f66662c69781b80dd3d6f66662c6c6f7765726469723d2e2f66696c65302c7375626a5f757365723d696e6372656d656e74616cedd094242c00a65d9f9807f0b0a89aefac302f34d1d396b9013b762f08714af3082ad765d80fe56d441f00"]) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x139801, 0x2) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:15 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0x31ae, &(0x7f0000000000)={0x0, 0xc99e, 0x1, 0x0, 0x26f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x0, 0x4000, @fd=r2, 0xffff, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000280)='gretap0\x00') syz_io_uring_submit(r0, r1, &(0x7f0000000240)=@IORING_OP_READ_FIXED={0x4, 0x5, 0x2007, @fd_index=0x6, 0x5ad, 0x80000001, 0x5, 0x4, 0x1, {0x1, r3}}, 0x8) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:15 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000000)=@ethtool_test={0x1a, 0x20ffb, 0x20, 0x6, [0x40, 0x100000000, 0x388, 0x8, 0x3, 0x1]}}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:15 executing program 0: setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), &(0x7f0000000100)={0x0, 0xfb, 0x38, 0x3, 0x20, "4d6322ebb4868656f60af6f25d78dac0", "7e2142908a4538df96b85e90ffb3d136d9bcc8e5d4d3a65ef36e03de93d84749f6a7f0"}, 0x38, 0x2) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000a40)='./file0/file0\x00', 0x880, 0x1) clock_gettime(0x0, &(0x7f0000000940)={0x0, 0x0}) rename(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x3, 0x5, 0xff, 0x0, 0x9, 0x80400, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, 0x7, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x2) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="897b428e75eb"}, 0x14) sendto$inet6(r2, &(0x7f0000000080)="03042a015c0060000503002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) recvmmsg(0xffffffffffffffff, &(0x7f0000000880)=[{{&(0x7f0000000240)=@nl=@unspec, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000002c0)=""/82, 0x52}, {&(0x7f0000000340)=""/98, 0x62}, {&(0x7f00000003c0)=""/19, 0x13}], 0x4, &(0x7f0000000440)=""/67, 0x43}, 0x9}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000540)=""/227, 0xe3}], 0x1, &(0x7f0000000680)=""/68, 0x44}, 0x3}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000700)=""/100, 0x64}], 0x1, &(0x7f00000007c0)=""/131, 0x83}, 0xfffffffd}], 0x3, 0x2, &(0x7f0000000980)={r0, r1+60000000}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 341.170295][T11490] incfs_lookup_dentry err:-2 [ 341.178349][T11495] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=11495 comm=syz-executor.5 [ 341.195176][T11496] __nla_validate_parse: 3 callbacks suppressed [ 341.195183][T11496] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 341.198494][T11498] overlayfs: unrecognized mount option "nfs_Ùexport=off" or missing value 02:59:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xb, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:15 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x8, 0x280084) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x100) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, &(0x7f0000000000)) r3 = accept4$unix(r0, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e, 0xc0800) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f0000000380)=0x1) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) lchown(&(0x7f0000000140)='./file0\x00', r4, r5) sendfile(r1, r2, 0x0, 0x800000080004103) [ 341.286668][T11498] overlayfs: unrecognized mount option "nfs_Ùexport=off" or missing value 02:59:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}}, 0x20}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:15 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x300800, &(0x7f0000000400)=ANY=[@ANYBLOB="643d003540490ab6c21d4ea42c1a450784a59e764ea8576911d34f20ab4f3f439d4b68fd9953f7bfa86573a1e70206c86e4f7fc657e19863555f3d1ecd0cdc9873a5d4ad5061aec6b67153fa09ffe225d48dbb7f23cca721b82aa3efbec59854b2c1e4101fafac05c64122ce1e08b8ca1f04fa9bca641b640109bc83b51c0a01449c8ee4385798de455f3eddc94036aac9717e1b3a743699323330c24599ab8a1b9b90660ba27c0ff47294a355c8b0d190702771fad6514f0087193779957f764e208a6009854bbf9fe448b1ce36a2f76272289fd44c", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,fault_permissions,\x00'/74]) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 341.324481][T11516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=11516 comm=syz-executor.5 [ 341.352814][T11514] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xc, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 341.385974][ T9404] incfs_lookup_dentry err:-2 [ 341.392088][T11510] incfs: Error accessing: ./file0. [ 341.426993][T11524] incfs_lookup_dentry err:-2 02:59:15 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xd, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 341.460089][T11529] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 341.476599][T11530] incfs_lookup_dentry err:-2 [ 341.492813][T11530] incfs_lookup_dentry err:-2 02:59:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 341.514359][T11530] incfs_lookup_dentry err:-2 02:59:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xe, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 341.532463][T11539] selinux_nlmsg_perm: 1 callbacks suppressed 02:59:15 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x100, 0x6) 02:59:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x5000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 341.532473][T11539] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=11539 comm=syz-executor.5 [ 341.532925][T11540] incfs_lookup_dentry err:-2 [ 341.550347][T11546] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xf, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 341.561528][ T9404] incfs_lookup_dentry err:-2 [ 341.621093][T11551] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14 sclass=netlink_route_socket pid=11551 comm=syz-executor.5 [ 341.692356][T11559] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 341.705371][T11562] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=11562 comm=syz-executor.5 [ 341.753571][ T91] device bridge_slave_1 left promiscuous mode [ 341.753640][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.754261][ T91] device bridge_slave_0 left promiscuous mode 02:59:15 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) [ 341.754310][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.062485][T11573] cgroup1: Unknown subsys name 'perf_event' [ 343.068803][T11573] cgroup1: Unknown subsys name 'net_cls' [ 343.105405][T11573] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.112859][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.120195][T11573] device bridge_slave_0 entered promiscuous mode [ 343.127427][T11573] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.134505][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.141914][T11573] device bridge_slave_1 entered promiscuous mode [ 343.178958][T11573] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.186187][T11573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.193468][T11573] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.200786][T11573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.221076][ T2023] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.228363][ T2023] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.237295][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 343.245270][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.262224][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.270687][ T2023] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.277740][ T2023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.285374][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.293617][ T2023] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.300637][ T2023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.308963][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.317015][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.330274][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 343.341795][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.361593][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 343.370096][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:17 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x2040, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), 0x80, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_auto}], [{@smackfsroot={'smackfsroot', 0x3d, 'system.posix_acl_default\x00'}}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) lchown(&(0x7f0000000000)='./file0\x00', r1, r3) 02:59:17 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x6b, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}}, 0x20}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:17 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x11) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000240)={0x0, 0x0, 0x5, 0x0, '\x00', [{0x9, 0x5, 0x9, 0x6dfa, 0x2, 0x7f}, {0x800, 0x9, 0xfd6a, 0x800, 0xd1, 0x80000001}], ['\x00', '\x00', '\x00', '\x00', '\x00']}) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) write(r1, &(0x7f0000000000)="e452c75e8c38c27fe5d1b70d0aec65653e3ebcb8f0612ed7", 0x18) [ 343.379403][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 343.442751][T11585] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 343.454868][T11584] incfs_lookup_dentry err:-2 [ 343.457718][T11586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=107 sclass=netlink_route_socket pid=11586 comm=syz-executor.5 [ 343.465887][T11589] incfs_lookup_dentry err:-2 [ 343.478932][T11589] overlayfs: unrecognized mount option "smackfsroot=system.posix_acl_default" or missing value 02:59:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}}, 0x20}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xff22, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:17 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) listxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0), 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000140)='./file1\x00') symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file1\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xff25, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x8000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 343.479934][T11592] incfs_lookup_dentry err:-2 [ 343.498026][T11589] overlayfs: unrecognized mount option "smackfsroot=system.posix_acl_default" or missing value [ 343.529647][T11599] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:17 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) [ 343.569735][ T9404] incfs_lookup_dentry err:-2 02:59:17 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x1040, &(0x7f0000000100)={[{@workdir={'workdir', 0x3d, './file0'}}, {@index_on}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_auto}, {@default_permissions}], [{@euid_gt={'euid>', r1}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) bind$netlink(r0, &(0x7f00000001c0)={0x10, 0x0, 0x25dfdbfe, 0x2000000}, 0xc) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004103) 02:59:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x9000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 343.601640][T11608] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 343.640508][T11610] incfs_lookup_dentry err:-2 02:59:17 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000300)={'syztnl1\x00', 0x0, 0x7b87, 0x1, 0x9, 0x4, {{0x15, 0x4, 0x1, 0x6, 0x54, 0x65, 0x0, 0x7, 0x29, 0x0, @rand_addr=0x64010102, @private=0xa010102, {[@end, @lsrr={0x83, 0x2b, 0xa4, [@empty, @multicast2, @empty, @private=0xa010101, @empty, @empty, @remote, @rand_addr=0x64010100, @multicast2, @private=0xa010100]}, @timestamp={0x44, 0x8, 0x29, 0x0, 0x8, [0x6]}, @ssrr={0x89, 0xb, 0x47, [@rand_addr=0x64010101, @multicast2]}]}}}}}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000003c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2d, r2}) mkdir(&(0x7f0000000600)='./file0\x00', 0x40) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x3, 0x0, 0x0, 0x201400, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x800000080004103) recvfrom(r4, &(0x7f0000000240)=""/145, 0x91, 0x10000, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r5, r6, 0x0, 0x800000080004103) ioctl$KDENABIO(r6, 0x4b36) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) 02:59:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:17 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x801, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=""/253, 0xfd) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'os2.', '[)\'\\\x00'}, &(0x7f0000000340)='!!-^/:-{\\[)\x00', 0xc, 0x3) 02:59:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x2, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xa000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 343.704389][T11621] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 343.740009][ T9404] incfs_lookup_dentry err:-2 [ 343.763350][T11627] incfs_lookup_dentry err:-2 02:59:17 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='ncpfs\x00', 0x10800, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) openat(r1, &(0x7f0000000340)='./file0\x00', 0x171400, 0x20) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x3020018, &(0x7f0000000240)={[{@default_permissions}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_auto}, {@index_off}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_off}], [{@smackfsdef}, {@fsname={'fsname', 0x3d, 'system.posix_acl_default\x00'}}, {@smackfshat={'smackfshat', 0x3d, '-:'}}]}) 02:59:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x3, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xb000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 343.791782][T11633] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 343.813907][ T9404] incfs_lookup_dentry err:-2 02:59:17 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r0, 0x0, 0x800000080004103) 02:59:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xc000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 343.872793][T11640] incfs_lookup_dentry err:-2 02:59:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x4, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 343.922209][ T91] device bridge_slave_1 left promiscuous mode [ 343.922277][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.950935][T11651] incfs_lookup_dentry err:-2 [ 343.961644][ T91] device bridge_slave_0 left promiscuous mode 02:59:18 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0xa00, 0x181) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:18 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xd0, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x19}, {0x6, 0x16, 0xfffe}, {0x5, 0x12, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7fff}, {0x6, 0x16, 0xe56}, {0x5, 0x12, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x80000001}, {0x6}, {0x5, 0x12, 0x1}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20040880}, 0x24040080) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)=0x5) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_snmp6\x00') r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r2) sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xcc, r3, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x10}, 0x40011) ioctl$TCXONC(r1, 0x540a, 0x0) sendfile(r1, r2, 0x0, 0x800000080004103) [ 343.972478][T11651] incfs_lookup_dentry err:-2 [ 343.987131][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.995518][T11651] incfs_lookup_dentry err:-2 [ 344.019995][T11662] incfs_lookup_dentry err:-2 [ 344.035002][T11651] incfs_lookup_dentry err:-2 [ 344.039727][T11651] incfs_lookup_dentry err:-2 [ 344.083700][ T9404] incfs_lookup_dentry err:-2 [ 345.561649][T11677] cgroup1: Unknown subsys name 'perf_event' [ 345.568036][T11677] cgroup1: Unknown subsys name 'net_cls' [ 345.605946][T11677] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.613367][T11677] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.620715][T11677] device bridge_slave_0 entered promiscuous mode [ 345.628033][T11677] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.635250][T11677] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.642853][T11677] device bridge_slave_1 entered promiscuous mode [ 345.679374][T11677] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.686426][T11677] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.693698][T11677] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.700714][T11677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.720801][ T2081] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.728357][ T2081] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.736970][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 345.744764][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.761914][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.770023][ T2081] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.777205][ T2081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.784784][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.793087][ T2081] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.800115][ T2081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.808338][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.816381][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.829941][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 345.841507][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 345.861758][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 345.870200][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 345.880004][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:59:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0xe94}, 0x4) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:20 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='mountstats\x00') sendfile(r0, r2, 0x0, 0x800000080004103) 02:59:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xd000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x6, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:20 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000013c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "942df921cb6a0f"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000057b40)={0x0, 0x0, "34011d384723f2a6c048da72b8014a0b3b5f52a8695e3dcd4691b1043c672a72b3c9d1958ca0ef177815715df4eafb11ae8568da3bab4b2d15a45a03bea020febbdc0e8da6fb02a2e11604dbe79174065f5772a5cc5d437b9e4c63f6d645759f6228621d5d13070e0add11a64d55e35aa2bf27f7cf5f7708c71cfca35ab7d24d8faced2d9f22210247ee6594aee58928a1bfcc73af277d56876f7036cb9ebf532a5f6b8caf7f10198ca45194bcdb9eb7d65d325ed7d2b61c11c3b6fc8fdc7b5794b77ce237e7a861f014c52c4123be24addc42381a9bb9b1885ead6cf2b92bf8bd8560c91d0cdd9ff014c317501e767def93906a0db528d641c1d543208020e7", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000058b40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058d40)={0x100000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}], 0x1f, "85aab227b8af40"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059d40)={0x1f, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xd6, "7f1ed6cb5c0606"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005ad40)={0x20, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "5ce8d78cebee6a"}) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r6, 0x800) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f00000013c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x4, "942df921cb6a0f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005bd40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005bf40)={0x1ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1, r2}, {0x0, r3}, {0x0, r4}, {0x0, r5}, {r7, r9}], 0xea, "0ae0c7d973dd07"}) r10 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r10) ioctl$EVIOCRMFF(r10, 0x40044581, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000640)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) mkdir(&(0x7f0000000600)='./file0\x00', 0x94) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 345.926451][T11683] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.934511][T11683] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xe000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x9, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:20 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x5) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0x6, 0x1000, 0x8000}) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r2, 0x0, 0x800000080004103) [ 345.986340][T11684] incfs_lookup_dentry err:-2 [ 346.003604][T11692] incfs_lookup_dentry err:-2 [ 346.025017][T11692] incfs_lookup_dentry err:-2 [ 346.051568][T11692] incfs_lookup_dentry err:-2 02:59:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x10000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x10, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:20 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) open(&(0x7f0000000500)='./file0\x00', 0x40000, 0xc9) mount(&(0x7f0000000000)=@sg0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='debugfs\x00', 0x200800, &(0x7f0000000140)='\xf4$$3&)\x00') ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000280)={'netdevsim0\x00', &(0x7f0000000240)=@ethtool_stats={0x1d, 0x4, [0x4, 0x1, 0x1000, 0x200]}}) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2, &(0x7f0000000340)={[{@mode={'mode', 0x3d, 0x800}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x200}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x7fff}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3}}], [{@fsuuid={'fsuuid', 0x3d, {[0x63, 0x65, 0x30, 0x30, 0x63, 0x30, 0x36, 0x40c7827c2bc01ed3], 0x2d, [0x66, 0x38, 0x35, 0x63], 0x2d, [0x37, 0x32, 0x39, 0x34], 0x2d, [0x32, 0x30, 0x32, 0x31], 0x2d, [0x39, 0x64, 0x39, 0x39, 0x5, 0x36, 0x62, 0x35]}}}, {@euid_eq}, {@dont_measure}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@dont_measure}]}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 346.086721][T11692] incfs_lookup_dentry err:-2 [ 346.103590][T11692] incfs_lookup_dentry err:-2 [ 346.114297][T11692] incfs_lookup_dentry err:-2 02:59:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x300, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 346.148900][ T9404] incfs_lookup_dentry err:-2 02:59:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x11000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x600, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 346.218296][T11720] incfs_lookup_dentry err:-2 [ 346.229636][T11722] __nla_validate_parse: 5 callbacks suppressed [ 346.229642][T11722] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 346.284754][T11724] incfs_lookup_dentry err:-1 [ 346.294860][T11724] incfs: Can't find or create .index dir in ./file0 [ 346.329119][ T9404] incfs_lookup_dentry err:-2 [ 346.511517][ T7] device bridge_slave_1 left promiscuous mode [ 346.518802][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.534863][ T7] device bridge_slave_0 left promiscuous mode [ 346.541456][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:20 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x800000080004103) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="950106659934d4c54ded3c2a7c900000", @ANYRES16=0x0, @ANYBLOB="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"], 0x1ac}, 0x1, 0x0, 0x0, 0x4000800}, 0x40) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x900, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:20 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) creat(&(0x7f0000000000)='./file0/../file0\x00', 0x144) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 346.758459][T11742] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 346.759951][T11738] incfs_lookup_dentry err:-2 [ 346.810016][ T9404] incfs_lookup_dentry err:-2 02:59:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x1f00, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x25000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:21 executing program 3: ioctl$HIDIOCGFEATURE(0xffffffffffffffff, 0xc0404807, &(0x7f0000000000)={0x20, "c306933ad76bd12adfb2409bde14a1aa1c746a967c9a891381332a39a76123f7c7c60d6b1689a8854afc35dbfba6c4006cf4896ad23f640c442cf80fb75677c1"}) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:21 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) dup(r1) [ 346.935527][T11757] incfs_lookup_dentry err:-2 [ 346.948001][T11762] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 346.984746][ T9404] incfs_lookup_dentry err:-2 [ 347.633692][T11771] cgroup1: Unknown subsys name 'perf_event' [ 347.640215][T11771] cgroup1: Unknown subsys name 'net_cls' [ 347.678738][T11771] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.685952][T11771] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.694078][T11771] device bridge_slave_0 entered promiscuous mode [ 347.700999][T11771] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.708651][T11771] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.716379][T11771] device bridge_slave_1 entered promiscuous mode [ 347.754643][T11771] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.761702][T11771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.768941][T11771] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.776072][T11771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.796682][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.803906][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.812750][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 347.820114][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.832423][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.840669][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.847720][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.855358][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.863746][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.870764][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.892141][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.901289][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.909266][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.918181][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.931502][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.947062][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 347.955899][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x2000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:22 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x200018, &(0x7f0000000640)={[{@nfs_export_off}, {@index_on}, {@default_permissions}, {@default_permissions}, {@metacopy_on}, {@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file1'}}, {@metacopy_on}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}], [{@pcr={'pcr', 0x3d, 0x34}}]}) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x3, &(0x7f0000000980)=[{&(0x7f0000000700)="b385e38066642625421a27ba9778cbc0f88f6be5e590b7828f7e51579dee19ece228b5b374e3cd359737a7042e6c44e2274b1ac9cf1e70c9905126955fef48f103d8328a843d8a495197bcca23bea8ed0c93d0b5f045534506d58896ed581d30c695f552618865b4143d7e6ac569abe98a8b23083d152ac1d62a076094ca006a29bbb5134c2b116265f078617a8ec10bed", 0x91, 0x8}, {&(0x7f00000007c0)="3ae67561168e1c49a0a8b60a53ea46dbf79cbfd3eb98d222a5211732003628cfcc9b2f2ec3151c315d591421ecb6b5ecf83a621c90b6b42c58493fe04be420ff55ba5c579e753c3d076d03a835195761acaa93a6671cfa6211599ce42794ce282da2bd0b21b316a3ac1e14e73ee3e8d339ad7d1d78d0a7888743acbc3d4f93727b7740dc28d6666bc3", 0x89, 0x4}, {&(0x7f0000000880)="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", 0xfd, 0x6}], 0x2830, &(0x7f0000000a00)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@journal_dev={'journal_dev', 0x3d, 0x40}}, {@oldalloc}, {@commit={'commit', 0x3d, 0x3}}, {@mblk_io_submit}, {@delalloc}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x10000}}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@data_journal}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x2}}], [{@smackfshat={'smackfshat', 0x3d, 'redirect_dir'}}, {@smackfsdef={'smackfsdef', 0x3d, '\'[+[/#\\+$()'}}, {@obj_user={'obj_user', 0x3d, 'system.posix_acl_default\x00'}}, {@subj_user={'subj_user', 0x3d, 'redirect_dir'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@dont_measure}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x33, 0x64, 0x33, 0x39, 0x34, 0x34, 0x65], 0x2d, [0x62, 0x37, 0x31, 0x30], 0x2d, [0x66, 0x37, 0x61, 0x30], 0x2d, [0x30, 0x32, 0x38, 0x65], 0x2d, [0x65, 0x63, 0x34, 0x60, 0x50, 0x0, 0x31, 0x35]}}}, {@seclabel}, {@fowner_lt={'fowner<', r1}}]}) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="747275737465642e293a28a240252d4000"], &(0x7f0000000240)=""/255, 0xff) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x182008, &(0x7f0000000480)={[{@nfs_export_on}, {@index_on}, {@workdir={'workdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@metacopy_on}, {@metacopy_on}, {@index_off}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@nfs_export_off}], [{@audit}]}) setxattr$incfs_id(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) 02:59:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x40000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:22 executing program 3: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x8) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00') 02:59:22 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000080004103) 02:59:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 348.003104][T11780] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.010462][T11780] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x4000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:22 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=0x6e, 0x80800) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:22 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x400003, 0x77) 02:59:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x48000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 348.073112][T11783] incfs_lookup_dentry err:-2 [ 348.081669][T11786] overlayfs: unrecognized mount option "pcr=00000000000000000052" or missing value [ 348.092679][T11788] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 348.117777][ T9404] incfs_lookup_dentry err:-2 02:59:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x8100, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 348.144587][T11801] incfs_lookup_dentry err:-2 02:59:22 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x2) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bridge_slave_1\x00', &(0x7f0000000640)=@ethtool_per_queue_op={0x4b, 0x0, [0x6, 0xffffffe0, 0x8be0, 0xffff, 0x7, 0x10000, 0xffffffff, 0x3, 0x8, 0x1, 0x0, 0x9, 0xfffffff8, 0x100, 0x0, 0x101, 0x6, 0x80, 0x5, 0x0, 0x0, 0x6, 0x979f, 0x0, 0x4, 0x6, 0xff, 0x7c7c, 0x80000000, 0x6, 0x8, 0xf404, 0x7ff, 0x8, 0x0, 0x7, 0x4383, 0xb955, 0x7f, 0x9, 0x0, 0x8000, 0xfffff001, 0x100, 0xb0, 0xfcd, 0x9, 0x4, 0x0, 0x4, 0x1, 0x519f4985, 0x7ff, 0x10000, 0x8001, 0x101, 0x0, 0x9, 0x8, 0x3f, 0x80000000, 0x3, 0x3ff80000, 0x80000001, 0x1, 0x9, 0x1, 0x5, 0x8, 0x8c5d, 0x9, 0x4, 0x800, 0x2b70, 0x0, 0x7d, 0x5e4, 0x1000, 0x5, 0x400, 0x7fff, 0xba2, 0x578f77ae, 0x6, 0x5, 0x6, 0x800, 0x3, 0x80000001, 0x0, 0x8, 0x2, 0x81, 0xb20, 0x8, 0x6, 0x3, 0x7ff, 0x9, 0xffffffc1, 0x9, 0x8, 0x3c, 0xfffffffb, 0xfffffffc, 0x7, 0xffffffff, 0x6, 0x2, 0x1000, 0x81, 0x0, 0xfffff801, 0x7fffffff, 0x8000, 0x4, 0xc, 0xffff, 0x8, 0x1859, 0x6, 0x9, 0x3, 0x10001, 0x7, 0x3800000, 0x2, 0x4], "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"}}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, 0x0) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:22 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000100)=@isdn={0x22, 0x1, 0x8, 0x7f, 0x1}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="cbc5945afc1a634e345dda130543988f974484359a3cce01e93241217eaceafcf28824d74080e6d8784cf2e33a045b234ae10bd012ae292a882d0194d7a24890b44354d1441331abea3c9f1a86f4f8bdf31814ce30072134185612609796a4d7c691d564010c54029b34e6f25178149e0e4fa7173e78ea07bbd5fbdf", 0x7c}, {&(0x7f00000002c0)="423b631095", 0x5}, {&(0x7f0000000300)="1aee312f4991d4d7a20d07b6", 0xc}, {&(0x7f0000000340)="38fb90ecd34f92d1af26dda13597d8ccd0c9baafd75a0ffb7fc3ef35066efd4415b8f76a2136ce1d67b246920209e7932e2cd3d429ed8f03c7022ef3f57e9a4d8fc81eab3f8db0e0794dc1320f672b6171ba1553779d1424177d070639ec83f4159d9668ee2763972216efcb83705d7b1d9e14755cf1fd0df643da41cd00a98d2fc6c40d48f811dd11cc35467c83fe9e146389027bbab573dceca53e0a9b60cec81ea12dce9de3244ca0abfd316d01d97b221a20ae4e8c94cf54c3fe66f4e4f954fdaf3e6e7196e65ef54d7a6cfb8c5cc70f521a3a1df6f515843219c344ede75bed574b76b4f2e92fe00e", 0xeb}, {&(0x7f0000000440)="ced3ff98eff85d500d1bec12cfa9926ccf6df28eb9f6a9c2a633df762b6a5a6427ba1ae1b487361cd093534119eb4c6f524052b89505af70ee2c5ca58258a4be5190aa31e8256db07e27b3aa34abf466d2716a5776e730ab168c6115b74f05ab3f4ab0f28784965d86535aa1044e69854c6f7d5c6469828c47b47976d85a1b289ecaa7b9fac975862265e9e4c5ece4f89f2e237a51d02e87e0f385318d2433678575a8ebfba14c39beb6a2a5157eb731671f4cb0e28f84f1aafdc91cc4d9f937e0dfb115804f53204eb1385b542d40e2625f64c732090aa615dd119b195859630f4747885a895273", 0xe8}, {&(0x7f0000000540)="f539d2af07375a5db042943bb9c9e1f2080c57f103c4d4c0d33a492eb0b84e0c79c21a185b97f8fd88c6f18c34f355aca055237bd7800118dcca58102fb79ef1d38e40398b6c48ef3338c7e7cdb3746b19d3ef504e7ca742edec7bf700e803cb6bf42a70e2373c986607e405807c836aef0e4541be", 0x75}], 0x6, &(0x7f00000006c0)=[{0x10, 0x104, 0x46fe}, {0xf8, 0xff, 0x20fe, "42511c39380c3cc39188c67868abdfc9196db3829e231cff44a489183077c7f5cc8bcd5bf74e7bbebe8ba8f5b32482a3cdb5143ec6973b2efc1a370464d724e6e293d8d96203592d9816c17ad022fec57d2cf57c487d6f76b7b771c82727d89e9e5d80fe793c8efa07b30b21ecdce75902f03f0e0c95a3826450c6fbaa3bb656aea54cbde6b3be4ff12ca6cd974616f252d28cf3610109e612d405efb877f3871a34131b18a8744019c9c3aa709fbc185fd0d4fec71b39caa71515943e4dfa3bc5e73358414d73e4dec3c9f99e3296333d36d79599396330eae918e4dab33d133fb537d587"}, {0x1010, 0x114, 0x2e90, "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"}, {0x78, 0x101, 0x4, "cf9bc747ae75c54782da4a0b513331060fcd560a465d95e5a2d9a0ff0b50d96791289090f851f43451fc3031972c42ce682014515ef7d9b641a27057c85cab1ed03851cdbab9166d1224db9ba2adb3f2efe545a137e649c1bab0bfd4d335cadef68941"}, {0xf0, 0x105, 0x9c, "c3d9ef1a819bf131bcba62359c16ceeb6264f931899f55424a9e7ab1adb54289955e5b3b804af3aafb5f16dc03bc4f7c3629994ee34d0db9fba274b8d7340e5f78ee16e686d4928521925a798386a517d73fde3ad3dd2a612569e14ddabdd962e4e4df71abbfc22c968dc26ad14daaf237ea055bc2005d818ca89898c37f6cc3432787aa2b932b950de76fbb48f84aa7c05db8e980ebff873848cd64029ff939a992d1666e0219765307b7d617770c8d478a93814110166ef3a8ad23bf8298de3b6f75c37a9b49f084b9ff62e09ec5a4c9e1fd3869f49b7ee0bd2c9387"}, {0x100, 0x84, 0xe9cb, "d89772a270966537f39608ceac12275263af719dc91a6beb8ddd351fd3391b4aa7af60d829a92feeeeb8cec00dd350d38a153888135fde0a4ac642deca03d4e7b9af66dc16ac078b9e0770696dee45a73ea18e98e41b44e1c3bca4be1effdb7bbcf91171255ce4cd38b67d8b63dd881b532141344ec2d7583ead9603558c9a0a680df64fe2d083215faf29d7e78792a3284f00d20e9524be87f626bbe13cd6b7bbf39c6c327e3bc772913201eec75cd2bb53dbf80421b01d62514c62046253a24bac44ec194789048d2a9f0486dac39bd36d16629c6bf906410475596e58616e7db84b853dc590e7521bcb"}, {0xb8, 0x112, 0x71fa044, "6b00bac7afe9e69afeae9328d716d4b06d6fbcc0904638f629cba4a97f64bc413af39eb44eebc7516f004a045b43fc7b862f2a5424354c7c3fdba2a791ca443f4db0a8774f76c02b5272e4a7e39730d70580594bdc28b0835c5c19cf06914c2cd6eeb92b279e047b11d75877dba48667ed1756dffdb8649b4dbeef34fe4bff4fd3a7ae471e3fbeb76af02d97b3bc09e1dd03d84ef4064bb71d4f7fe5402cbea2a9a3d4d3479e6fa6"}], 0x1438}}], 0x1, 0x1) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x3) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x94) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000001b00)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x34000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 348.187534][T11786] overlayfs: unrecognized mount option "pcr=00000000000000000052" or missing value [ 348.199152][T11809] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 348.220857][ T9404] incfs_lookup_dentry err:-2 02:59:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4c000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x400300, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 348.306747][T11818] incfs_lookup_dentry err:-2 [ 348.317765][T11824] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x68000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 348.385384][ T9404] incfs_lookup_dentry err:-2 [ 348.416480][T11838] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 348.581327][ T91] device bridge_slave_1 left promiscuous mode [ 348.588395][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.603382][ T91] device bridge_slave_0 left promiscuous mode [ 348.616134][ T91] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:23 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) r2 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) r3 = syz_open_dev$rtc(&(0x7f0000000000), 0xfffffffffffffffc, 0x100) ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f0000001180)={{r3}, "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"}) syz_usb_disconnect(r2) ioctl$EVIOCRMFF(r2, 0x40044581, 0x0) fallocate(r2, 0x8, 0x8f17, 0x87d) 02:59:23 executing program 3: sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0xf4, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x1a}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9eb}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x25, 0x10}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x10}, 0x8041) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x40000, 0x100) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:23 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x2) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000240)=@md5={0x1, "f0a59cba8ab461946b87f30f7c4de93a"}, 0x11, 0x1) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) 02:59:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x1000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x2000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 348.994255][T11845] incfs_lookup_dentry err:-2 [ 348.995115][T11853] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 349.050217][ T9404] incfs_lookup_dentry err:-2 [ 349.727423][T11870] cgroup1: Unknown subsys name 'perf_event' [ 349.733761][T11870] cgroup1: Unknown subsys name 'net_cls' [ 349.771384][T11870] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.778585][T11870] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.786536][T11870] device bridge_slave_0 entered promiscuous mode [ 349.793735][T11870] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.800802][T11870] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.808724][T11870] device bridge_slave_1 entered promiscuous mode [ 349.847172][T11870] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.854579][T11870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.861863][T11870] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.868872][T11870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.890841][ T2023] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.898552][ T2023] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.906673][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 349.914625][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 349.924100][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.933007][ T2023] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.940114][ T2023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.949248][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.957916][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.964961][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.981668][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.989587][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.002156][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 350.014810][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.026993][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 350.039643][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.052489][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, 0x0) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x74000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:24 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 02:59:24 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x111000, 0x88) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x3000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 350.093012][T11876] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.100311][T11876] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, 0x0) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 350.149339][T11878] incfs_lookup_dentry err:-2 [ 350.151415][T11883] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 350.205453][ T9404] incfs_lookup_dentry err:-2 02:59:24 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) chdir(&(0x7f0000000240)='./file0\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') chdir(&(0x7f0000000180)='./file0\x00') r1 = creat(&(0x7f0000000000)='./file0\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') sendfile(r0, r2, 0x0, 0x800000080004103) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000200)=0x3, 0x4) 02:59:24 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x80, 0x100) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x4000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:24 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 02:59:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7a000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x6000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 350.555241][T11898] incfs_lookup_dentry err:-2 [ 350.563557][T11902] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:24 executing program 3: mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x13d) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 350.614638][ T9404] incfs_lookup_dentry err:-2 02:59:24 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x4000, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x7, 0x2, 0x8, 0x8d4, 0x13, "04b9b0a84bbf71c7"}) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) sendfile(r2, r0, &(0x7f0000000080)=0x1, 0x2c9) r3 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r3) ioctl$EVIOCRMFF(r3, 0x40044581, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, &(0x7f0000001180)={{r3}, "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"}) 02:59:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x81000000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x9000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 350.663910][T11914] incfs_lookup_dentry err:-2 02:59:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x81ffffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:24 executing program 3: close(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000000) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) openat(r1, &(0x7f0000000040)='./file0\x00', 0x20081, 0x4) open$dir(&(0x7f0000000400)='./file0\x00', 0x14800, 0x90) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') mkdir(&(0x7f00000002c0)='./file0\x00', 0x7) mount$overlay(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x10, &(0x7f0000000380)={[{@nfs_export_on}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0/file0'}}, {@index_on}, {@nfs_export_on}, {@index_on}, {@metacopy_off}, {@xino_on}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) 02:59:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x10000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 350.722038][ T9404] incfs_lookup_dentry err:-2 [ 350.740038][T11929] incfs_lookup_dentry err:-2 [ 350.748253][ T91] device bridge_slave_1 left promiscuous mode [ 350.754704][ T91] bridge0: port 2(bridge_slave_1) entered disabled state 02:59:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x8c010000, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 350.777026][ T91] device bridge_slave_0 left promiscuous mode [ 350.792061][T11934] incfs_lookup_dentry err:-2 [ 350.804406][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.814047][T11934] incfs_lookup_dentry err:-2 02:59:24 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) mount$binder(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="73746174733d676c6f62616c2c73746174733d676c6f62616c2c736d61636b66737472616eac7d7574653d5a497ce05e6a4a426bfdb018d6e7e46332211f18b7d812e9e7169c3ca36705f0c29b82a1a500000000d11308692fa06dd1642c636f6e746578743d757365725f752c736d61636b6673666c6f6f723d472c736d61636b6673726f656d2e706f7369785f61636c5f64656661756c74002c00"]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0xea60}, {0x0, 0x2710}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r4, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r6, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r9, 0x0) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="02000000010000000000000002000100", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0600e111", @ANYRES32=r7, @ANYBLOB="02000200", @ANYRES32=r2, @ANYBLOB="02000300", @ANYRES32=r9, @ANYBLOB="040002000000000008000200", @ANYRES32=r3, @ANYBLOB="0800fe1c", @ANYRES32=r3, @ANYBLOB="10000000000000002000000000000000"], 0x74, 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x84) [ 350.824358][T11934] incfs_lookup_dentry err:-2 [ 350.835293][T11934] overlayfs: missing 'lowerdir' [ 350.854812][T11939] incfs_lookup_dentry err:-2 [ 350.866180][T11934] incfs_lookup_dentry err:-2 [ 350.871844][T11934] incfs_lookup_dentry err:-2 [ 350.884433][T11942] overlayfs: missing 'lowerdir' 02:59:25 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000100)=@sha1={0x1, "f1ad7de8a6a15db2da354ae2041be3b1850e1ccc"}, 0x15, 0x3) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 350.905118][ T9404] incfs_lookup_dentry err:-2 [ 350.912671][T11943] Invalid mount options [ 350.947178][T11947] Invalid mount options [ 350.948142][T11948] incfs_lookup_dentry err:-2 [ 351.009448][ T9404] incfs_lookup_dentry err:-2 [ 352.178677][T11958] cgroup1: Unknown subsys name 'perf_event' [ 352.185073][T11958] cgroup1: Unknown subsys name 'net_cls' [ 352.223615][T11958] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.231221][T11958] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.238629][T11958] device bridge_slave_0 entered promiscuous mode [ 352.245943][T11958] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.253688][T11958] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.261431][T11958] device bridge_slave_1 entered promiscuous mode [ 352.298060][T11958] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.305318][T11958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.312990][T11958] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.320009][T11958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.340248][ T2023] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.347821][ T2023] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.355937][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.363954][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.373850][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.382461][ T2081] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.389681][ T2081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.401350][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.409483][ T2081] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.416512][ T2081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.431579][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 352.439581][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.461216][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 352.469838][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 352.478446][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 352.487819][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 352.495939][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:59:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x1f000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x9effffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:26 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x8000000000401f, 0x0, 0x0, 0x2000412, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000240)="dc884615601517ddbfce574516774726680503e7f716b87838c686a063eb004189c91cd8f50f440abe41c16f9527fc2911fccf7a33341b4d8fc27275bcc137af9bf3514b88b5fb2e89f416237ef1c70a5a9ef9d183af3040ce7aee465e1153194016b5734dbff1fff7566a68747e8f66b48eb3d7c7e33a6f88f8b43d34e5414f88d6bcbab74f0d055faf417af6c40ed01928adf508663ef6d2c944e8dc211c58c31cb1fc874d55813d82d56f53d3a6c105a2230db74e113668297c4d982042d698e8b832443a6d85056a0a", 0xcb, 0x7ff}, {&(0x7f0000000100)="5116caf81648db8ee96e9affd07f419a4d2de9f9482f2ff88c7598e16fb6e57914eba938f4b819d8bb96f4220c4ed77c7ae53525dac05c2d0c0ea565e40d3d83173beba9af0797695fe8585399", 0x4d, 0x9}, {&(0x7f0000000640)="04d53620e5364596f30a4df0bdb578a693149453d139f1cee86bab59545827bbe55107e40de642d0be9a56036b351316048621a1640647387e8b7e93a479e36d19f4f97fb0aca77fa61cd9c4c20e4eb1ff6600fd1555c2aec705ae1143e27964b717134c6b6f7484a16c2005884ffbffe09abf245a3186ac1173723f73caf66fc1d58809a7de38619800f6387968abc0cb80eed3206baa8da668d4442ccf05e949521093e9d4c4aadb88aa54b4e5e019a4fa09dc9abff4618ef6d3e67e8e480a05f9f9b461862488f87795c146259ff8cb884ee2b0deb1734e3f4f09529064188362f6198ed4800333e334b56d5d8fbba8ef7d8e5d7cfff6265a89252f1e2e1ebf1a819b99dd9fa7667192c3f835831050769c1f12ecec44e6427876fa8bab9353405aaccefb3e911e1499170e6784c56f4aac25b332b21e5804afb7188312d3e55ccb3719ab2db03e827376aa5df21b349f955d6bb1ed3049c2f4ced306190cf2c0d59525117ed3aa9680e2455e3009262a8dcf0ea31e1077f2b8a8bb837d85f4f6be3e16223ce14b0a45f6eea40bc4eab01ce61afbf879774e7443f86a67a31736e86251afd25e1c59409b28673f8ee2fd9045792b244c80984362a4c2ea40c9e67400a0a88f0e8a3cebdb4cbc851bd349e1d6d57edee8a4a9741c0e9ca7dd7aa1f7a1b557a0b715714c065864c6cd4100b08f39d1ab18ecec1678efdbe29425b27634188f6988f8a8a8db3cf91745669aa96a0934dc6f26a70cdff0e22fcc3f7f6f2994aacd5bfbccbb8c62a3c3a04c6d191542c21e4be0f69113fc448d5f86cc77b9345898962c9587c7f3042cc2da7cc52b2071ffc656638b0b57c77ff6f06ac07a93b147e13b97b3b1844cacac218614a6cf16df663f56f0d43b6d19155a2d0e9ab65073dcaacef624ddce9a820c159722445e5bba6cc99eea6fd21225b9e330cd92c17b9f9550133652461b66091734fdb7145d9963ca6a837ea1cbf7a5f54afcb4eeb0c5b8a09dcbb1a0c1cbdb890bcf322755a081fd7b5fa6432c46f15c5289b50edf77e89ae1ed84ba5d735d6975180d5fe54620eab679d65e4e0f1f52939a63fe7b87a19740cb5ecff4878f2f8f11f30df1f87ecb8e266985041d3e604f0af02ebcd4e7bc6953058fdafa548d611f08461e1c9b4ad60e1cc6bc47034386a8eac2c6512f15abfe708cff354e045ad535334fbff1b6bbb6e62123ecdd5c175f09c0196637e9268440dbd8cf6d8d89d2677ff62d23b30dad3d30df00ed7b32e3a20ea8fe7bd86dfe3cc032895f0753c1cd696fcce05a850fa7f0a27fded84db1ce710e993ce040484762ed46c54f409b7e80f2c4618a1fe63d6c530e27dead590e36e80830e3adb0e2aeaaf22133c5589fd2fe27b77148594f2f25b6c299c721f16e08a0abc7f36a04b10716f70e436d84ae8856c55cdeda57ec5d74a945ccc7c8dfbd019f6086dfe116ec300daf980cc5874afc1fe5f9e58d490fbe6d03302fba831c7b356aa7dbe3efa0d76720362489cf16617e5bd878efac6c559c4c2f1677a9fd338ee8512e72e393fe47b3d2c07a96dbb23d458e9bd9532125e8c53873649fbb47679991f7b0fd678a8786c62193e52f3f0e44c817676fa8174fdcb71e7d35dbf1fade406f5101d02c6e079175a5c05989f50ceb6a42c91fb855d7c1871a66ff9c6268227913d4b37cfca3046d22ce3765fdc8eb9810c758deb085c9d44cc6612d5b143ba333ea1974953c857d70ee9d275e20b8e81dfbc405202fcd7ca912aea9f6ad952627e9b131cc5abc0c804c2874694ab1633c16d7c1fa27dbd62fff4d1da7d89330217353678cde4384db267821cb0ae40580ac0d922657ac4cfa754c039cbdb0aa854f15ea4878d362560f249e79b1ca4e1f0f369134baa9eb336846fffb60495d324c1fcabf11653c765cef1d1e4562278dc0f3b351db4d35bef61d7d497e10ed6acedbb05477d62c8156983a13f6c0fb7db41ba5ead791b74f50ba17fc7797cea6416afda5b0fcc0649b52763cd0ec5d360d48d46ff4af7c376b12899fa10b5cf741ff6dbcafacf6ba6925f1521e1f089a37c190d913030d2d3c346f4e234c2b73e996c66c3958315442f384e169c279d313ea06f0c71f288b19ed19ffcc1ef4a84f84240d73f19be519df8f037cbc3d17ca698f0a190b8a7e8ee66555aa93f9c52a5d9c103bc25a5622c4aea7c6bfd09d74817b45393851bac32fa90579bac6b32b9f2ec5ecaf4b1ff99d0474e516ffd9aa05d784109ac4d15fafcf656d1bce0026262d9f77272e99bbbf0c5cda3aa14a90c1c90f8bd82d1b345d8f7ea524433d79f00163e9e713bd09f23c6242639e367a8d48b485a791af9dd1cda4bbd2a3eb1d8c82c521fb1b8766b13873d4ef877b1397064ad4c7736962cfe05f8dff5f41ca0b908841b52912131e4fce2d3ce5b01866e732f523119676b18d8be416cf0601c149179f3496f25d7c42b4173ab39a1c00e5a22357d5662f34ee6321d9137aa43f590d823dc5e9e5a2e326eb3761bdc708dafccefa0c01e5b541f825f5d012cb4665330e872e58b6f4e32e4042a4c01e080d21da0f0f20b84f20c3e369f2bab6e916b7cbb7a94057ea8dc9bd61d7c27831bf5e9368595ecea294b10a0c3ee88adcd231401c1a11fad4191a17d158e5d7e820547b4e572ee6d866e4ef0b5b149df74da8520fb3539455299963aaa5ef4b0c17580f35e289090c8ff912ede8ed4b65d5c187e7fea1d33b4b7e6f0af1b321afc13c6f0c2e83cd65ad98bc3221d49ade5617af103ecf5980ee26c1b58d1f347d5c6bd677731f2f9067cedf1ba7b38bc8bb5f0921a4672eb0c5844bdf938421a7ab20a95784e6ad7578b94be5e1f50519a6969fe4bc71b8a670bf507e0f21c278ae4dbdfe7431fb6e428431472ea3bc35c58aa8c5b57526d7085f172e9007d45b2079361bb56a8d2642077a6bb68d57e47447790b6452143c3189865d3c05a5bcdaded7f342c22e70ea5ae8b10a27479c3f324f2e4e723d5ea6116e482408521ae6eb3ccb9ba9f76029c3ad1096824273f85c17d6a479f295802da4bfa8d096183d87e1a4c977823d5ba2542a5ed18f79d103085a55dc270d81750f11c693f323e9e55b4cb95d51a3a0b8993d0a18da4f4e38649da6ea42dac287d35d7cb29564ede1efdc2c722de8ff934a04f3061036e14653ea347c126cf2aa317d512240d47c40079bd14139fc558156efcab010a46dcc1bc4deea98e6e94da8d360f58c0b637a5d134d1f419906fdbfafbfda2c5201ef02e710874f4b3c6fc116f8460aa468baadba5c2b27b362ec75e63592c81d73bfadcd0e13e6cfda5a422e06d28e3d87989f4f729486029f526299d7e145feca5c1b9ddc27651197d591496fd22f21980e2d5b3033287e56cc073e5bef4fb74ef5736b24519ddb8e690652d1b58a5095d26c27f75dc912596497977a5ebaadd0083e8ae52162100718042cecd6024ed8656c61b8237ebcbf8c814dfa516fc5542902765db3316abdb889f223e201fba4ca87bbcc8dc3a9bfb1922f721aa9e30d40f1a330c1c85682623ef0f43e13278ef07c36733e89a1650497196b9d8716950428053ca57c847ac48b48a3ec5fd1e0dcd94a48ab50457fa57fcaa7fbd3e322138b9ce2a69f2fc0c7b24ccef45889bed76676074018b7191c8a69ca830fc50471dc51218bdced37aecb086a563a743d1d1732b3bb895e88263f24230bec34d3277c5cc12b3bf7c2f0d172ba9a59f34b885a90ced795a796c81cc0ec2b07f5ab41d4e2d1570b30de6dfa97462f4a6f30841029d5b178e0e208d4bcdf289aff980fded07a0b99fa9cdfc1d49d1f1b948ca7fb814d13924c6befca0f53347342802794bad3f58124cd2ed4a5554c6c56b191f49d1f55135a2e6bc820746655f957bca02b35be2244d763713b000832e66beee5bb1ab3ff23f9d78d9cc183b8e42a964ad1129b4b0a1675165eac5fc070fbf150e1628d481d3d140195617d3bae0a457a80358a8613cd5203fc7c3d60c1c512f0b80e108f9ec30bcca653de2a39d011c29bf319ac0a624a99dc8b0a588c060b0cad925b87316e8e9e96b97bfaa74159e1f51d4ba272ab31f9a01ab01650ae313aca7b02c541f4819f914ce7ec5be34e6f6b181e23d21757df1507f7d06faf59fc300df90b6d1c54542f2a0f4cbe2fde521f3cbc80523a2437db8e6d652198375f5064000e394dff7899b5e21de6f0a845d7a8b2242921fd3939e183550c50ad83c4eefb74d7f0d46d3094a404ba4b25fd19efbd30a1c434bd99d6ffb7ebccc3e39888fed17ba86efaec99bab602eea979cadc7cc4073bfd037973c4d1904996f703f490570b9698c211af1c25159afe67ad9594f806d5c60625776278df799101460df83445c46082761626206d02b6b5207ad666120101fbc0e46605b9294c4735d97cba120ffa64057a1221ed902f1049530fdf01f5fad74182194ddb841ba429a16e9121172bfca19bed9439633acd1d701a328509a7cd6d86a471aa3349c576ac30d63ceea2c0a99816bcd4e18caa1dbbe9e7431ce85cbf86648389db461005dbc61b09787a495ae77aa239481493207ca0f7d0291e7133330fd5696e4b3813af3e5abaf23ebd2665e978014e2490551bf92c5345eb6cb35fdf14353f5b4ed2ca679d12aa99f09dc270ff4ffaab945da322f96e5b6a43970bb54f42aaea2ac6de6fc82ff6060c57ade70652b8dd51cbf975b5243a6b3d185e1c72d7a78e9c8703a8ef26729ee67a8bcd5ccf9b1abd3605303c0ca8369b827f480c8b5ce872cfd47afa5fe98e9ebd449c4b304f741d59d12586d187265811653b821cdfe01173d69b2c1c15f78f39bfbdc75720fe9bd9b427815e731b2778defcaf5a4b53f3dc2d00b9f590d54d214cb1de41bcf5e4b88f583b3887887f4cb3f0a2c3dfee393d79421a55d1ba7e163b810cc4e3bd3b2e517d38c73a721a630bfdcb516b83de0f2341e1ec51c8b0be1b206ab9b8deb75132d2107212d153c41d3558285b4a549d4f266748a79a1b96c2ab9e4313917b8b8f4abad837e1747f0b289297875afbf95eb25c466dd404f87a299b40eaefc2d3790399ea2c303feeda03f457003ca23fc66e4da6f9a79bd2bd62d6befca4a88c44334ab35b2f38bc7942b829937fb24635d6ace57aa322353c354bfb35d5b34f4b9881365dec081281152c95c7477811ea28301d694937082d8a501c1b478ea607cea202e31b1c079b379d40e92145a9d1e96c46bef5913e9eff6ab21100746db39312baf78c963287526a078d042bbd344a6b4b32eb8ef95ed5de32f2f0378d4d5944104fa9fc012f885c90e087e7dc9ce29e50f23613b6519f372e8b39a04f2955c6ea941f3636638dcb9e027d546382080fff14d37aecdad9093ab406681087366a83310359a2fb46357a8924975651aa543352803c5bfaad61dbac1b7a779956838565de07370850930a8b23037111d4be8b28ea56a4d75305427c9091be38f2c19392655bfbb2d197161a4b7772f3e245f44c4cccfa2d7992b3d427dd56692e450750be3b2eea8b78f6e5609c91be14c7783c6a43b6f98868e47318127187a04c6a89a7629524a062f7abb7cf914ef6f514a0ca96a8d5f807395aa7584ada0ef5157c59771087ab8bc69b83cf48e7adf3fb499549daced282ba7cab5efce3bb1cf2718bfcf334e1f1be1303640e2879755907dfe2bcbff6e07d8f7b609c031d41116b1aaff1b301f983817e15cd4fe34a56c0e24083e741ce8793e735e4bcbe419688931f2edc7d9ce929", 0x1000, 0x3}, {&(0x7f0000000340)="3eb01a9423070b1837c452e9d389728ea56de44759c5fecd5e8b2a9db97b43d54e159d235772094ce8427535442246d05d7baf73d9307b608dd12e", 0x3b, 0x94}, {&(0x7f0000000380)="a75115aba895d706bdaebb7dd6c0ccd822bf10190dcf203b08c575b2db", 0x1d, 0x401}], 0x1000, &(0x7f0000000440)={[{@uni_xlateno}], [{@smackfsroot={'smackfsroot', 0x3d, 'system.posix_acl_default\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'system.posix_acl_default\x00'}}]}) 02:59:26 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000240)='./file0\x00', 0x200, 0x80) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="00000000000400000000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='squashfs\x00', 0x2000, &(0x7f0000000140)='+(]\'\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:26 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x48) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2020000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') sendfile(r0, r1, 0x0, 0x800000080004103) r2 = fsmount(r1, 0x0, 0x81) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x402001, 0x182) [ 352.536591][T11964] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.544149][T11964] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xeaffffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:26 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10080, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 352.590101][T11967] __nla_validate_parse: 3 callbacks suppressed [ 352.590108][T11967] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 352.597260][T11969] incfs_lookup_dentry err:-2 02:59:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x20000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 352.633972][ T9404] incfs_lookup_dentry err:-2 [ 352.645668][T11980] incfs_lookup_dentry err:-2 [ 352.650747][T11981] incfs_lookup_dentry err:-2 02:59:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x40000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xefffffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 352.675880][T11984] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 352.685234][T11981] incfs_lookup_dentry err:-2 [ 352.711385][ T9404] incfs_lookup_dentry err:-2 02:59:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x81000000, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xf0ffffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:26 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x24, 0x0, 0xbb269987621af008, 0x170bd2c, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x1}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000891) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff81ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000540)=@id, &(0x7f0000000580)=0x10, 0x0) recvmsg(r0, &(0x7f0000001a00)={&(0x7f00000005c0)=@tipc=@id, 0x80, &(0x7f0000001900)=[{&(0x7f00000006c0)=""/216, 0xd8}, {&(0x7f0000000640)=""/52, 0x34}, {&(0x7f00000007c0)=""/140, 0x8c}, {&(0x7f0000000880)=""/15, 0xf}, {&(0x7f00000008c0)=""/52, 0x34}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x6, &(0x7f0000001980)=""/97, 0x61}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f00000002c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000400)=[{&(0x7f0000000300)="dffe1f2f71bf2f5cf8b2d390cca168d9ab6d202cf18f1278aa13c637f60b8df69d10d2b4897d", 0x26, 0x3f}, {&(0x7f0000000340)="432ef3ce7940bec88b2139e0912fa8e01fba2b08a05458e0db62136545e9717e612d9e3fb8cbe07caac4d534f862d3df1c230cccbc76fb969270f71eff407c85e0597f0de0f97ce44f8d533ed375545de7d72c31e39b570cc407e9ba88254b197bff7e09c25ff579c4923e6fa40bb0f0babbc8f7703ffcfd276701bba50d0d83457f75aad636e11475081ccc2a37", 0x8e, 0x2}], 0xc0041, &(0x7f0000000440)={[{@huge_always}], [{@dont_appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor}, {@smackfshat={'smackfshat', 0x3d, 'system.posix_acl_default\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffffe0}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'system.posix_acl_default\x00'}}, {@euid_gt={'euid>', r2}}, {@obj_user={'obj_user', 0x3d, 'system.posix_acl_default\x00'}}]}) syz_mount_image$ext4(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 352.771428][T11997] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x81ffffff, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:26 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) getgroups(0x6, &(0x7f0000000400)=[0xee00, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01, 0x0]) getresgid(0xfffffffffffffffd, &(0x7f0000000440)=0x0, &(0x7f0000000480)) r6 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000140)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200df00030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4401}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r6, 0xee01, r7) r8 = getgid() stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x4}, [{}, {0x2, 0x4}, {0x2, 0x1, 0xee00}, {0x2, 0x4, r0}, {0x2, 0x6, 0xee00}, {0x2, 0x7, r2}, {0x2, 0x4, r3}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xffffffffffffffff}], {0x4, 0x6}, [{0x8, 0x6, r4}, {0x8, 0x5, r5}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1, r7}, {0x8, 0x3, r8}, {0x8, 0x2, r9}, {0x8, 0x1, r10}], {0x10, 0x2}, {0x20, 0x7}}, 0xa4, 0x3) mkdir(&(0x7f0000000100)='./file0\x00', 0x44) [ 352.829788][T12005] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 352.875154][T12012] incfs_lookup_dentry err:-2 [ 352.890135][T12008] loop0: p1 p2 p3 [ 352.894153][T12008] loop0: p1 start 10 is beyond EOD, truncated [ 352.910731][T12008] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 352.918254][T12016] incfs_lookup_dentry err:-2 [ 352.928487][T12008] loop0: p3 start 225 is beyond EOD, truncated [ 352.941138][T12020] incfs_lookup_dentry err:-2 [ 352.961038][ T9404] incfs_lookup_dentry err:-2 [ 353.023222][T12008] loop0: p1 p2 p3 [ 353.027306][T12008] loop0: p1 start 10 is beyond EOD, truncated [ 353.038784][T12008] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 353.053639][T12008] loop0: p3 start 225 is beyond EOD, truncated [ 353.067143][ T147] loop0: p1 p2 p3 [ 353.071096][ T147] loop0: p1 start 10 is beyond EOD, truncated [ 353.082558][ T147] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 353.098115][ T147] loop0: p3 start 225 is beyond EOD, truncated [ 353.141048][ T420] device bridge_slave_1 left promiscuous mode [ 353.147218][ T420] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.172439][ T420] device bridge_slave_0 left promiscuous mode [ 353.178593][ T420] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x9effffff, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfeffffff, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:27 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='bdev\x00', 0x20010, &(0x7f0000000140)='incremental-fs\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f8963643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x19001, &(0x7f0000000300)='^\x00') getresuid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@private}}, &(0x7f00000005c0)=0xe8) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r3, 0x0) mount$binder(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x18400, &(0x7f0000000600)={[{@max={'max', 0x3d, 0x2}}, {@stats}, {@stats}, {@stats}, {@max={'max', 0x3d, 0x2}}, {@stats}, {@max={'max', 0x3d, 0x4}}, {@max={'max', 0x3d, 0x1}}, {@stats}], [{@permit_directio}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x34, 0x66, 0x30, 0x65, 0x33, 0x63, 0x36], 0x2d, [0x39, 0x63, 0x34, 0x31], 0x2d, [0x37, 0x38, 0x228755b7702d8a9a, 0x66], 0x2d, [0x36, 0x51, 0x66, 0x36], 0x2d, [0x39, 0x63, 0x31, 0x37, 0x37, 0x37, 0x36, 0x35]}}}, {@fowner_lt={'fowner<', r1}}, {@fowner_lt={'fowner<', r3}}, {@euid_lt}]}) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:59:27 executing program 4: r0 = eventfd2(0x890, 0x80800) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000240)={"69888cbe31144fdb61b01e66baf8fc89", 0x0, r1, {0x0, 0x8}, {0x20, 0x8}, 0x364, [0x89, 0x4, 0x8000, 0x4, 0x8, 0x7fffffff, 0x1, 0x6, 0x40, 0xd1c2, 0x5, 0x5, 0xb7, 0x100, 0x8, 0x3]}) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r3) ioctl$EVIOCRMFF(r3, 0x40044581, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000180)) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000140)) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='coredump_filter\x00') sendfile(r2, r4, 0x0, 0x800000080004103) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x40) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, {{0x800000000000000, 0x3, 0x1, r5}}}, 0x28) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(r6, &(0x7f00000000c0)='./file0\x00', 0x480, 0x82) [ 353.460422][T12028] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 353.464109][T12027] incfs_lookup_dentry err:-2 [ 353.491832][ T9404] incfs_lookup_dentry err:-2 [ 354.310448][T12039] cgroup1: Unknown subsys name 'perf_event' [ 354.316927][T12039] cgroup1: Unknown subsys name 'net_cls' [ 354.353411][T12039] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.360442][T12039] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.368121][T12039] device bridge_slave_0 entered promiscuous mode [ 354.375045][T12039] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.382435][T12039] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.389816][T12039] device bridge_slave_1 entered promiscuous mode [ 354.425795][T12039] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.432858][T12039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.440081][T12039] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.447123][T12039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.467041][ T150] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.474278][ T150] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.482461][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 354.489829][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.499382][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.508393][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.515463][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.524581][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.532742][ T2023] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.539731][ T2023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.552701][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.571189][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 354.579787][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 354.588420][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.601327][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.617027][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.625904][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 354.665281][T12045] bridge0: port 2(bridge_slave_1) entered disabled state 02:59:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, 0x0, 0x2000, 0x103) 02:59:28 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @multicast1}, 0x1, 0x2, 0x3, 0x2c3}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000240)="d604ff4550e341b953f1605ff0e6e0528b9a765c197d301bfb4508fb2325a0f1feee3573104159d7a30df48867898dda6f28891483939867417e46e6d42d1455753a2defb7af0e35aa742d1db14b61005e894dffc94ff0a1183e7cb1b2ca94c1301a0f7f486be86e3a26d9a8b5c149e74e7f10a6ce38298c37aef14e09029e8fb9c1799f59f9b5177e95c492bb299e86f2ccc41d2fc948d17b2901dfc98a0f71ac8d2506a63a7f6a7adcc5895f748413cffcbfc8fef17a714152223f5a8f68f19fbe895f2ad4187517772c85f5", 0xcd}, {&(0x7f0000000340)="0b16b516ddd50961b5efc0169a48d58bb24bbdeba1f36bc6031832d161343ef714264f9d7f49976a63e6abc3e63503b21debf1ab22b4fd6dab6d7831db14c51a95bfab2b19bfc0f7dc350b829a553a20325be509d76fc53072d80ebd786038ba4f57f168a8ff6b596fbaf95d200c9451f72b9f5baac10ecd0dd5e67281c90ebcdc36192d1bb1505507731b048f3491a9d81cd84853d7c12bbd56035264b60fd83bd6b989782a68bebf47293d0ff71d14df711a4a9f3233239a2f67d971047b2d2b88490817e443a3d9e558a5a3641c60e93bb67a8e37d970e3", 0xd9}, {&(0x7f0000000100)="697d8ab9cdcbda2bd187effaac242f83242c36e3e4caa2ae0205eca2fd2fd8057daeef1c319274ecbaf778ae139f23bb8fb491b543c2f1", 0x37}], 0x4, &(0x7f0000000440)=[{0xa8, 0x109, 0x3, "2418bd65e169db3f7c46ce2d07d403ffdf7cb307e142bcba97e1aad4240d4f7ea849e4f6b2ad8ed1b0bc03352ce6b9c47c74a3deb64375fa0b13859f5acb5213d1e1be40903aaa84fe9548b9ba870ac65b2e6e169ac87c151f6c2a6c77eb9c74081990e5415492d172ec5296e4c1dc7c69105c6aa34767d20ceb70861d444e79f1c684f2bc70c551277805a80ec77149cacad1020cccb4cf"}, {0x30, 0xf, 0x5, "ee1706020af105647ae9373b80ca7ed9f2af60c56e02fe3fbbd4"}, {0x58, 0x101, 0x3f, "6d138562f47171e72c912450ee7ee2071b3da8deab31cee56f0ef644d831dee42e3b848207df203e5465847942f7a3397721b8353b803e5f9727dfbe2e659ef0cbe1fd0494"}], 0x130}}], 0x1, 0x884) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:28 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x831, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xeaffffff, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:28 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f0000000100)={{'\x00', 0x2}, {0x7}, 0x38, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)="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", 0x169, 0x0, &(0x7f00000003c0)={0x2, 0x11e, {0x1, 0xc, 0x3b, "82aa72e82571fe1c4157e2710018851e9ae8e4facf3c639e5402d71aee01dfe46a16b650c7c240bd23cf9210414f0ef664a2bce95337e038bc5c5e", 0xd6, "7ddf8145cf4de11c11553fcdd5b06560a5dade56f11c1e5c240deacd9ae507ed424dff5f590370ef1963f92abb7c897aa7ecdc7cff73597d227eb950265f5f51207b65fa476f2251c2c20d343b6e9009237147ae2f78c0f9dfc87f6d72c637209d89f3108771aa03a5e24df2a2576a1a0f2a2687665ef8d7b0a16d095df452cf30baf746a343659a607c94e8c28336dbb8c857bc60656f82c2ff98571532316fcad659c506dfdaf68d939841fef49e27d8a3666bbc4cd0db76db80b77f42f3ce8bdabc05020f8a0dabc58acad1a16178f4124c6ab159"}, 0xaa, "2dab5e666079b7fc21613f8d57a0dfaf13c0c6f19593f74170fccf3e728eb9e7459e7326f88809003e07fa2b7013b1102287d2d032f7dcd164277e618a547276564695a7fd5fd05d4be99d3ac6ff8e9e9a2d6f9dcf25f1fc257cac083eda509eb73849a90abff52ea051c1fb35afce65aad7e9c13f01a0d6df8ac71d410ec98c02e80c8bea8b5508ed86523b46aa4e53956e665fe92632c9e7d4047c0c9daf71a371c6f2db16af9dc55c"}, 0x1d4}) sendfile(r0, r1, 0x0, 0x800000080004103) [ 354.672734][T12045] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, 0x0, 0x2000, 0x103) 02:59:28 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 02:59:28 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:28 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "e0a0918ac65b1a4070b7432dfaf4e568"}, 0x11, 0x2) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x1901) write$P9_RREADLINK(r1, &(0x7f0000000180)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r2, 0x0, 0x800000080004103) 02:59:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffff81, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xefffffff, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 354.721250][T12047] incfs_lookup_dentry err:-2 [ 354.734234][T12054] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 354.749327][ T9404] incfs_lookup_dentry err:-2 02:59:28 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000), 0x45, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xf0ffffff, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:28 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 354.817122][T12066] incfs_lookup_dentry err:-2 [ 354.821979][T12070] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffff9e, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:29 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@multicast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xa00000, &(0x7f0000000340)={[{@redirect_dir={'redirect_dir', 0x3d, './file1'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@metacopy_on}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x66, 0x66, 0x61, 0x66, 0x61, 0x37, 0x39], 0x2d, [0x62, 0x30, 0x34, 0x32], 0x2d, [0x32, 0x30, 0x63, 0x34], 0x2d, [0x30, 0x30, 0x36, 0x66], 0x2d, [0x0, 0x0, 0x33, 0x31, 0x31, 0x61, 0x37, 0x57]}}}, {@uid_eq={'uid', 0x3d, r0}}, {@measure}, {@measure}, {@seclabel}, {@smackfshat={'smackfshat', 0x3d, 'system.posix_acl_default\x00'}}, {@appraise_type}, {@permit_directio}]}) 02:59:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xfeffffff, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 354.897460][ T9404] incfs_lookup_dentry err:-2 02:59:29 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) creat(&(0x7f0000000100)='./file0/file0\x00', 0x30) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) linkat(r0, &(0x7f0000000000)='./file0/file0\x00', r2, &(0x7f0000000040)='./file0\x00', 0x0) 02:59:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, 0x0, 0x2000, 0x103) 02:59:29 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') openat(r1, &(0x7f0000000000)='./file0\x00', 0x40002, 0x10) sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffea, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xffffff7f, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 354.930170][T12092] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 354.947485][T12094] incfs_lookup_dentry err:-2 [ 354.958855][T12096] overlayfs: unrecognized mount option "fsmagic=0x0000000000000007" or missing value 02:59:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xffffff81, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:29 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x800000, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 355.013494][T12105] overlayfs: unrecognized mount option "fsmagic=0x0000000000000007" or missing value [ 355.044702][T12109] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:29 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000100)='system_u:object_r:agp_device_t:s0\x00', 0x22, 0x1) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffef, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 355.072896][ T9404] incfs_lookup_dentry err:-2 02:59:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xffffff9e, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 355.104111][T12119] incfs_lookup_dentry err:-2 [ 355.117973][T12122] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:29 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x880428, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfffffff0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 355.156936][ T9404] incfs_lookup_dentry err:-2 [ 355.188561][T12131] incfs_lookup_dentry err:-2 [ 355.214599][ T9404] incfs_lookup_dentry err:-2 [ 355.310952][ T420] device bridge_slave_1 left promiscuous mode [ 355.317312][ T420] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.325800][ T420] device bridge_slave_0 left promiscuous mode [ 355.338482][ T420] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:29 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x108) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2005405, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r0 = syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c626c6b73697a653d3078303030b03030303030303030303930302c7569643d", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) utimensat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={{r1, r2/1000+60000}, {0x77359400}}, 0x100) [ 355.854549][T12144] fuse: Bad value for 'fd' [ 355.859770][T12146] fuse: Bad value for 'fd' [ 356.513944][T12149] cgroup1: Unknown subsys name 'perf_event' [ 356.520211][T12149] cgroup1: Unknown subsys name 'net_cls' [ 356.557814][T12149] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.565238][T12149] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.573072][T12149] device bridge_slave_0 entered promiscuous mode [ 356.579882][T12149] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.587349][T12149] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.595287][T12149] device bridge_slave_1 entered promiscuous mode [ 356.631867][T12149] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.638894][T12149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.646334][T12149] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.653377][T12149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.673414][ T150] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.681295][ T150] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.688636][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.697542][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.721318][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 356.729625][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 356.737922][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.746154][ T150] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.753287][ T150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.760686][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.768809][ T150] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.775851][ T150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.783580][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.792424][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.810626][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 356.818948][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 356.827438][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:59:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x103) 02:59:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xffffffea, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:31 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000, 0x40) move_mount(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x60) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:31 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x106) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x71fb00, 0x22) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r4, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2048, &(0x7f0000000340)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file1'}}, {@nfs_export_on}, {@xino_on}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@index_on}, {@nfs_export_off}, {@upperdir={'upperdir', 0x3d, './file0/file0'}}, {@lowerdir={'lowerdir', 0x3d, './file1'}}], [{@permit_directio}, {@fowner_gt={'fowner>', r4}}, {@obj_role={'obj_role', 0x3d, 'memory.current\x00'}}]}) creat(&(0x7f0000000100)='./file0\x00', 0x40) r6 = socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r6, r1, 0x0, 0x7fffffff) r7 = openat$cgroup_ro(r2, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r8 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0x400500, 0x3c73eabebd1f3fc1) r9 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r10, 0x0) sendmsg$unix(r0, &(0x7f00000008c0)={&(0x7f0000000440)=@file={0x1, './file2\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000002180)="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", 0x101b}, {&(0x7f00000004c0)="d980fc3c1dbc7d6755d6baa7e6071fa0b7d2508836b0e1645c2aa6db223cb977d89116122003f9c14828e687fbf23db1375127be36550de03fd0fd175d71a85a533ef9aabe847e2e8b43d987ff98c1b57d79e3b91fadf8bd3170c0309b7d7bfba6cf99aca0e24567fa107f38d4a1dbbd69b6494d058cc2bf8561630e249bfcae77e57aa6c48139eab99ef98a914df42164b99b54dd76ad0353390f665f7544ba56ff88244662cee39edd88", 0xab}, {&(0x7f0000000580)="6096a083f6aa51f097bffbdcffa91d60ae9dfa08f45da9b638db8c9d26d1fb1022ba19b8f8dcb00a07e733fc377c95531f6f4878f69f805156b90da9b0c6a47124ab3860f3c9d59bfd5f5cb77b56a53a7760320e16254bcc0d55f5ff19845759544814ff5efa16eb3c879e5077b904778e7ec623c625f37679dc8a7d03464cab53db302558dbef6f9c6b7ed479614308660a7e4c208ac9b7c0fd493db9578bace3f2bb84663b93a7bc91ded36545ddcc7968d5babce211d2e9e51be34b992af9bcea9ab0588da08e9a113733dd1ece", 0xcf}, {&(0x7f0000000680)="06fcb7ac8cc3fd4ad9781bac", 0xc}, {&(0x7f00000006c0)="eca0727698c75c65877ba7075765cf771dc4ca453ba6b69698ce5ae2117e4b21524de47aa487f3272b3b88a6606882248d2ffcad4a388d80eb609a8c7250edae5586cee1f30b34957d77fab50d85f0817ccacbe3aecabc0a882e4cd8214baa26538e94411d17fd210c8e9741b81733a182012c048ab1719a73ff2f75c08b13e93d9078bee0dfdceacabae9cde0d6", 0x8e}], 0x5, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0x0, r10, r5}}}], 0x20}, 0x94) ioctl$KVM_GET_XCRS(r8, 0x8188aea6, &(0x7f0000000240)={0x5, 0x7, [{0xefa00000, 0x0, 0x80000000}, {0x8, 0x0, 0xffffffff}, {0xdb78b96d, 0x0, 0x5}, {0xffffffff, 0x0, 0x1000}, {0x7, 0x0, 0x8}]}) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f00000000c0)="0646e3") 02:59:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfffffffe, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:31 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00', &(0x7f0000000240)=""/191, 0xbf) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000100)='./file1\x00', 0x4) [ 356.874184][T12155] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.881666][T12155] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x103) 02:59:31 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) mount(&(0x7f0000000000)=@sr0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='nilfs2\x00', 0x140000, 0x0) setxattr$incfs_id(&(0x7f0000000140)='.\x00', &(0x7f0000000240), &(0x7f0000000280)={'0000000000000000000000000000000', 0x30}, 0x20, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:31 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400400, 0xb8) sendfile(r0, r1, 0x0, 0x800000080004103) [ 356.938598][T12156] incfs_lookup_dentry err:-2 02:59:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0xf, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xffffffef, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:31 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffff80000001, 0x5, &(0x7f0000000380)=[{&(0x7f0000000140)="eb4e64be3cbf1fd28692f824a2c3df99906ed5f76a9989b8170af925e0fddc6690eff7c7abb495d5a81cf3b2beb7315076d8648d0ac8194d20569839d1cac5a13c7c5024ff726f6d3e2ffef0c5a906bcbf8cc61a98242cd78292e9f4187347bbcd970cdc2100d405a53c1275821378b8", 0x70, 0x400}, {&(0x7f0000000240)="0f6ced1bc8748fb670e9720bca3ebc06f2a8caa1d17bcb800f1e574307b2b834c022ec6681b3ff79f65b86a67a8fcbf32dd7e6f344d106e3dd01c248efc890acf850ad663ff8cfd299dbc1c4ce4eb00365b66f9df7d258f385f73a4fd55cdc9210cbf6cbb495dc8ae0fd88ccf4ba3980ea6436e489c2e1905b329110f1ff413bace0210053813a8293cb0bfde24fee11b9", 0x91, 0x4569}, {&(0x7f0000000640)="a8fd9ef55341ccff93f14f3c42df5548deaf401963042cf01d48b98e2677cdfb30a6dc317a4a71a78d903bfe3791cbe843fcb479a8013190c714488a670facd9b691b84d757ed8e29abac76f8d332b209e87f51f996202598b6349741cfbfdb6aca3fdd4bc4132db1cac9b05b7e4604254cd4d7b3a8e737719e0fdb3390e36799ae280d51c6965f2668f94457bce258add890ebfe3e55891af2ea0c0c5bc3334e70f5f48ee93aa66c72fc7f7a47749134fcf0974bf255e41cb83482d7290ae314dea33c8b389eb7afdb517d9ac0f21f7a7c7875549a1a8c1d68b34e86a7019af537febef0c170802675d90eb508b1f97dc23a1724458d6a92eaaeeb153501241403c18acaed62e7f211819487f126d31cd3b2d6edf746dd6df772652c20564477bba3e3f9a6a3c574de49fcadeb5d61da12131daa99154922444fe0a639b8b56a238c9222a05bc94f637ff96ef264b6cf889174b459a219bc2334a3645849ec4a9579e0018bf430035f2f4386ce3a7b14c824c1ac86f00ea0d6d22746a45ef285ba1eea41373603e3cba1d79035e0da8e90720b0d40c2f0ef8234e200b966749b6b40ca1a9d8feccd96bfb37cda1dd3408ecb59b5b6416bddf80942ea1d6d7eeea3e6118e1ac4027b55a3ab817e49b786f0af126717e2bbcf6c93527f8045329a95ffc487736072975d6042b43f117933e1f7318c7f20b4dd36d406ded12d40f606ccf99c3f2be15a1fe7c888d1414e090f1407e631d742551790c9f40b962428ea9cd3e3ad53f226cbb02064f4bd25802b53b28a3d14fc5192e74fbfc6fc6c81ce35dddbbca91a8135ec792d66e986ea6904982dbfc6190646df3ed131a89f469977f6a8c1199b48d11708c159acd7d74ea71020444af6148ef801bb03adfd85728b4c76539178d7a496b5a05352d32250f1a97a54403275285458488b037c43aa155952facefc9c9c092db5437b606d1acd3a503ac31892f22df1833ca588ad806c072dd8d3f326a7b864b1201182cbc38b99ca755245907b30e73c74d5d365af0df0d8fd670924b8a0eb1f61d8e30b2b71fdf2dd0c7b6581597c9e87725fea39e6861ab7159d37d9a65e5e5362623df69e18ebf21348a99ea2cee183b4562cbc4baf3084e9871da6953b8af61b1090a15ff17dfe29716ada0a36c7768fa25d7eda4483facd3b623aa1ac5861c07a3ecbe56a2369174c05202101be2e9b0d9aabf3df7590a7b82a97eb672ff804b572f97065edffae8782cb36332927ae24838b22a0b6d419cfc45e8ba5fd0875780fa89035e58b9cc3bd27954cef6918bcf6aef32459d62d8fa5f521b35aad41c304d52ec9a2f5047b2fc13f6d860f2fc605d70adeb6446ac667b235b4cfcdb7ba40d242189e1dd784d9f8ceff090012a73cdaadccd0f07936014252d12d2d5f6473e7ba1b31abee569b59aab1a475d6745e4bf59c9b72b9ca022544d656bc6ab2eea5839c3c5c12e385311c806bbbd2510614082c33bff48eae5d4a343d3b4b3b56cbcea2b72340a8f3b10914bbd028b5a69065d764de70c0cecb2cce75e8efc39454b066b3a4bf9a624631807d75a2c6710bb581994f4a716bfcf8a9e2ff7ca40cbea3da015ce2fcdfcb51df62c61c3da01fdd540341e1c54342ebab37d64d2e5fd73daceddbc07b52bb9e4b7ce974f74635766be28ea62df999a0b2a3d8f003160b4720e41fef33d67523f2f4f34c885c8ccbd79acc905d5c36da00c722d6f704bce72b23013a7f556fb3e0b86dbb3d2ccc1eb86c2f86bf2960be7f525be344f83e8428111132ee6e65aa9b6c2099a30e89310d05f0988ae2a4876ff52fd6338f2b8645d75e8b5ccc3026d812fc3508335abca165105f498b4da5cdb07d3e9e1491bdc29195f59509df3486a9131ea0ea54bca7a02e3c656194ac187684c333e1288e68b47159e6422847cb45e848ca0d7adacb2dc931f76418949fd3efe7e0bd0f24a173ac97e4100ebbea3da7559950485de46eeae3f0a364f6ecc58dd6acdf00014b522cb34caf5d89b311c788aaad3a2bb1a7ab0732a60467f6bd3d63a3b32b9f99c509daab4e2aab5ee14ed68aaf19dabcc18bd819cbb1dc53eaf9b8bf71cce2b9c739441318827a032865576a72275dae0f3cc10edde105a0f92de5cae5bcf1f44408e333d6ceadadd86b08e9f3eb52ddfe3ea0e8d38018f548ade3ae783d42e4021a7bb85c22020d6f24e5ec1a89fa4c9a4224f30f01e4e695cab675da85634abf3c9529425a4caeddc3247b78c25e8ec30acc06e75ca061a408778288946fee439e74c7bf0c56408e5cf9118fd6b519eb7e4b5c0b86fe9e77b0ab277f8107171740bcc7387099004ba640fe04b53b5861783b36415a32e91578e2ac552efb0507af93d7b1ac89a2bcfe338d4d44e76629c2fd8217cc1bff9bf18b2d0f5d90df6657456978e784e56c5ff3d4af78ad28e91f7b369846d48e4e5de2e34952f3dc19a478b7e52d814f2a073758cf4f20f5fba8fe8756043da1e97593a741bfd43b79cfb823ba7c2c729a6e252bf05c28e482ea26ecdd87815176c86e2ef53b0c36fded62875e07831de88536403b4404eda0a277c7ff2632d930462bfa9901b52d4dd4c17a52b2e29d445107e341f94dcf7a45fbce89f0d99efac1081ca9fcea7fa005f92a7c81f81c824dab860bc9a175eedc19676c466c4b606490884d062c8c7866cb078c226f019abcb8ee722c327c37769a3804de4e498d8a44558fb277ccee670d451575d0ec0c3419ccf111c69b233414f57c5dc4f037702214a5dbad9be773a93faa6f8761e7d4cb8897da28cea8a85eb9821d7768c55440b0e3d42a20d571038b3554210235a3e7332b974752c6fda52c2cdc0a56dd00b40658c09a8322bef59de4efb74f69621040d16d717be681025e282262d9bffe11e8579ff5fdee5d95751788d662904d531d48cff7ddc2d5f73e393a6b6e07a144a81d1e0dcc16f4b5905a79295b4e87b09e21f6bfc46a0ed39f6b6863ebcb3a1beda043ed81c86d79d29d37aea20a03bb0c080cdae8ae50eedcba857730ba75ec23c35eadb3805a9465897e43db605650ab024742b6de9d69ca097108f4dc41329363d576f1b8dc9fdc92417d2c1ca1f5bd17de414ad7ba7de4a1c5e784e483b6a25150f00a39a80bd3f1c2ae535d2091a1fb6ae5891a22cfb4c6990e0f12830c3b19aef1301f557f872a1b2dc31f064245661f2c8b9910b744e5783d467b18404c6226ac4f025ac556c8a68ec745109df15b3036b45610311d69f0df5340f48f2f9e724ce7d32bfa8b45bd07df39a3d2c15104b8df1d69843dbbec1724c073209c703cac01724b8dec5bca8995753efa13f74e140975157c1b94881b02d0d23f025df622298412329e0b87dafe59f0661c39d928606bef4a575a1e89157a7832a0371443d8d610d84ce43d936fb5e0c62767c83c4e55f822939bcc5784218c50f9bcc764908b9017cc8cfc1e5d55d424748ca194e137a4ab29dd6be077ed24beafba024de140c0e4ea7699d269c28009c26bf2d6eee6430f781a6e0e1ec7eda8eeb817f76dffd52a5bd725aa98bbdb617e674c1b38a6a99d74557864ab5d536bc1f7eddc1af2a655cccac664398a84d5315e28c1df83175031b49da6c647772533ccf8dc1e27ff5fdb7cf162c7380c7d26f9b730e58021d57ca8bd15dd237a64b6958b259e5020e4c981ecee4cc8a7a65c33b79f630f1767bab866115696294552d491c136b86ab350fb5bd78474f113006fdf7208aa96705ab06e618afc6bd8bdac3fc716bdf15461d020811962dd957b603ee206bedd4f01774fabab010a98e345758453331b888d0cb527961be22a72e06c8bceaf6f2f7324f0d7d98771b1d4c87a236d4eb17738517c1dea7ba820b6bc94fafc422f9d9f7ffdca9cefbea3cd2109a657498ab898f66e497e651898bb25fadec60b69af23cce02a76e9ee7ed553de3dd40546762fc5d294814d531073a04938a3d5609af782a24b48bd313736925e32fb779eeb51f452e0f3f6e91910aeb281f630f7b416747af0754a344796d5faf7403affb90f87c68024e365bfcad5c206ceaf0765da41cf33695508e41882d00691cdc47e3051472d6667241a90931b461746e9882d51daaf18790410b172acb745349511b617c84d9b3ecf3d39c2650ee470422f104de755418c837a05a80c3054424cb9aacc00d510ea0b1e9021597f0978bf272d1517c7f8684ae4887912961fd0d1fd2b0b0fef31c9ed8debade0da9f5c9908c156ea819852be4867daf07dc11d2a6c71dd135d807db5d61b956d57fc5f7c1e44554de26b0ac61245828a8b5a5623363c2fdb3d804b1e62fb76f8cf6578a070539ba64a81a60bf2da85fe3a7974ba5b0191551c0dd8c7039329693d193e870705c00261a8d19fc7c138a62081cb6b438b4c1f13bc50bbb2aed2f123adf9c8741e77fc61dd784f37b7b8a1ed096504c43090a5f8bdfe3a4a423144af99b92e0622ce080d74dd9c67e7997f397e16a6c5051eb491e714f62b1a78b39247770a01ba732d9561159375c2b4f7f36f05651bb0fd3c342df932efadbd477f3f7ba9f77200ed677b3a3f5df331f28027743c102278ecac4ce98b5b5457eb2b30a6513cbd996c9adb9da2ab2a1b65079890a0fae8f1d7f3e465e829b896bd073c9e6c2be3c178ce6e8b16991b9129c09b17e7f91b097cd40e5d353902a21e592ac985966b2d07b4c4f1fce32b65aa560e26ffe8d1cfb980c629d6c2af7f70fa7ca91259caff5be20bcc8c9434acdfc07693f71ffd640980d6c17a5aedcc076c2beb7a9f106b7695fdaacf81067d00c538f46ff839e10c7dbf2098c2e7f0e155b26a000c56d2ebeeb5ef2560ec9064301728a4700a85aefbf45df6bd169a1b657a65cacd39801f39ec1b5c8cf1056003cd4730099971034288d6d56e4b84cbb6a2767b3f5d7020958936ed4b627dc3d94d03e9da58b92e43ceaf54cfe10e7809d710fc59720d27f515410a3cce010f305fd5b8074485d707c9aacadc7d8f2a5977dacfc148d057298077effdd1c4d71149795806f7f4a689a86999b6ba650023395a3f050e22c1754c4931bdb215383e3a0cc6b0a16b1c398eb27fe8811c4039a2a73fb13fbc5141e374723e9dafed420797159426de5cec6fb192a8299204dc1fe2a23b754b56748bacd3bfed785761c24f11b6beeba8f6e10c0dcb080f3c763dd964c393e03b9e23bb236358d62b6ada7cc5019dbbfee9c78cf2b88a55cd8d7e9e3faa300cf757dd9415b7f5bcba9d30d5b956095893cb9aa7de0b6fe2391dfd95bb4e8195e2d0cac80e9d26fd61c51ba74aabdff378de83b3712f8cb71d5d826b1a0ca850c6a3216b073c595047f6208dd5f168369f0f0a1b7c14a5819356b769e7728a721b481d6d209d816582995edce670be75147512b3678dbb1944168cf370ca07e55c11b3d7b78ce8acf52797657a617deadf1e6ec7948605ad4078d48b39744a0df5f7d7216daa03f613d8ca539218b317b045b7dbae2ad54aa729e063c309559f9cbb67764abe395352afe3f7ebbd34f21f54c1b0d5d661fbc1722b47e58cd3b6a07df8edff2930a2554a9d3dc246834d70f1b7fa7dd2e2c9c0a803ecc68000e99dfab6542127656a16442165be2d0e398dde2947ff0383fd28e688ab64c9c18ffe81665a28e47870b762025d9df53f9e139201639af68e0853243f2bb3918ebbe22ecda9246dbfe0f7348626db1492574cbaf118281dc674c5b26bfb4b0f7177708b2a66a86d2a1585509df77380e38db4941ef2cb7c225", 0x1000, 0x4}, {&(0x7f0000000300)="0ef1a9dac000ed9fb7ef2812a66ddc97336392ab118a7a89b60b6dc3883befc6ea5dfe45f68f4629714eda05e9c827dfa2115cf92a1fddb393e4f9bb38a1", 0x3e, 0x8001}, {&(0x7f0000000340), 0x0, 0x7}], 0xc000, &(0x7f0000000400)={[{@uni_xlate}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}, {@uni_xlateno}, {@utf8no}], [{@audit}]}) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) mount$overlay(0x0, &(0x7f0000001e00)='./file0/file0/file0\x00', &(0x7f0000001e40), 0xdbfc0c20a6c596b0, &(0x7f0000001e80)={[{@workdir={'workdir', 0x3d, './file0/file0'}}, {@index_off}, {@xino_off}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x62, 0x37, 0x37, 0x34, 0x34, 0x36, 0x32, 0x32], 0x2d, [0x62, 0x65, 0x64, 0x35], 0x2d, [0x39, 0x62, 0x62, 0x32], 0x2d, [0x33, 0x33, 0x64, 0x63], 0x2d, [0x37, 0x63, 0x36, 0x64, 0x61, 0x37, 0x32, 0x38]}}}, {@pcr={'pcr', 0x3d, 0x38}}]}) mount$overlay(0x0, &(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40), 0x800, &(0x7f0000001d80)={[{@metacopy_on}], [{@smackfshat={'smackfshat', 0x3d, '/'}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@subj_role={'subj_role', 0x3d, 'utf8=0'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000480)='./file0/file0\x00', 0x5, 0x9, &(0x7f0000001b80)=[{&(0x7f00000004c0)="1cceef1f2e49f64762a290b72d01bd83f1980fd6e6dc60dbc48fc5ab96a363626c3a1337864be197afd07dc8bdb5eeb25aa5223b56a76df9d742520e3b4e6e54b771121e57b2c375d34d6e3ccb9733d90f43d414d7da5a9bbb061aeb38d7e75d2b5d11b1189af2a5f16d01dda8111f6881541446815430b230862085f63237", 0x7f, 0x6bc}, {&(0x7f0000001640)="d8fe269841237dc4a65ec3759cdae512d2f8b8118dc84ec3473762a39d95a85c844f108d356e75a1e8527230da4ea0fcb7da9e42a6ba50a460f1cf01579332cb33f8f30bbc7ae78a9fad3500d7f43f42515849933c2d8e413f272b04a1ded2cdc8e15b218610df174848ad4bf14d623428974353c230e86b8664294edd7c7408e12da765959a66b83e5a209a32a473014550e5619f9fc4c0222d69d0b193d83f6f735ae1c0a2a3e1280d63587b97fca50d369d85d5d7a231b2735ea55d86fbd8cad5", 0xc2, 0x8}, {&(0x7f0000001740)="da46f567cd431cb07b9bd9d51772a67743e3aeb785c0ddce7c718d9c19feb80e2df54af57c8624e2a640af3679aa1fcef02c456a6b9655becea7906c535d0844e75833a787ff2f7141dfacca851538febe4a819888b57758aef7c884d52bbb74905cd76f4da72bdd61b75ce85b2d2951df69ea398df50a838a7bf698af99c7dc6f29ab4b98825e82f51dc4ce0d76884edebc27aab2b43f2ff11039bb4ed4fc1ed75b8e964cef5c475197668f4a991b060f320b4a3643f27a5108922ec71ab19366073aaad6a693e694c08b5e50d20706eeebc4ae3f7ef099444baa", 0xdb, 0xcbda}, {&(0x7f0000001840)="eb10c1a7f14a8044d3b0c70ecacf3676338e8df140258dc6c2b921f15da8508d8840ce2c6af40f151020fb0990ebae30e5ad67a89c9659090ab54e29c00e92494fa2791315f1ff8638cc45b3402b8c2c57a2ab63f69de9d450420a46d4b26342d8a7cd0af6ffc10bcf1b623f0bf71c5a4c9eae0c76e0a494580c129624dc3344bc9244e6cfafe10188cd26a8f7c9143f152cbb09c87c51dd813e9760be1aebbd7c2a0880ae2dc7142d272fdd9093415b5a5da98e5ee84bd11de71153580190c48738e8029d0109121b33807af9243fa873ac58dfccd405eb816d79400d5aeb33fbcd19", 0xe3, 0x3}, {&(0x7f0000000540)="62685ecddca2da8bd9a07d0645da72b53ceec3b8ed81d048e3d787d8afea127398d5ae0a36d0abcc6be32d022a978d1b5d13ff17326a9fcad2e1b3700df94d26e36fcfd91c596fb5e733c2045ac8546b41963c355fb0753592c9473c5a1a2b381f1edb53e6d1b9c3fd5bd4b794e0af452f9e2fd728313a8d403038ce401a86c3a0b0a45bae3c0cad04019aee41f2e6a96158a6d83a390ac73987e28e524a0c9cf0c0", 0xa2, 0x8}, {&(0x7f0000001940)="d183e8ad", 0x4, 0x101}, {&(0x7f0000001980)="21bb6d6a40422671ac716bddca29b1407b4ad299ed018bd05915806284179271cd9c3d5659e4fd83cfdc3193ebe1b7071c3530b087732cc586", 0x39, 0x7fffffff}, {&(0x7f00000019c0)="63b4c728012f3d61d763799a50f5b685480f2c5ee54648eacc0db3f7503b25cfa99d6e8a7cce2851726398756d2db1c2581c93d6acab08e9cf266bfbf99318fd63d272789b459e9d4e695e365a24e5f1d3640f7b8abf8cb32e1e19a680b03f0476739212d762cf425605447bb34f49b9813de9f10fa687fd454b82de37d2e17b6aeea554fc68917654f96d654e5bc0c77e8056c69402d4a7b5fd58f4e9377cdada6ef6aa045212e2b3f143540820e6726fd61e3c985c005ac6b0cfdff3ecb48c4c19c2826fe566556a039d2ba0a7dccd1e64072a16", 0xd5, 0xe2}, {&(0x7f0000001ac0)="e84855c899ae0c5aebbc548b5aa071de107ba9b336fd785590e272556f1f26739a601cff606974b493ad548721ff86e19741df2c301906836ed5c2957e6558cc20bf05f73df473136e78c85ca1f552ab98ce5e0886b95b9ab53aa4cb652939f5669ac4f61d9de8c7df8964c84baaa46d3f70dc30a778631cb217dd5bc4496955f1fe8582b18ee70561", 0x89, 0x3}], 0xa0, &(0x7f0000001c80)={[{@iocharset={'iocharset', 0x3d, 'koi8-u'}}, {@utf8}, {@shortname_win95}, {@shortname_lower}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'default'}}], [{@euid_gt={'euid>', 0xffffffffffffffff}}]}) lsetxattr$system_posix_acl(&(0x7f0000000040)='\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 02:59:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x10, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:31 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='securityfs\x00', 0x1108800, &(0x7f0000000380)='\x00') mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1080024, &(0x7f0000000240)={[{@index_on}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_off}, {@index_on}, {@xino_auto}], [{@euid_eq={'euid', 0x3d, r1}}, {@obj_type={'obj_type', 0x3d, 'incremental-fs\x00'}}]}) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1000c00, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 357.025825][ T9404] incfs_lookup_dentry err:-2 02:59:31 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) umount2(&(0x7f0000000000)='./file0\x00', 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xfffffff0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0xc0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 357.078274][T12187] incfs_lookup_dentry err:-2 02:59:31 executing program 0: sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x2, 0x8, 0x301, 0x0, 0x0, {0x7, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x8805) mkdir(&(0x7f0000000600)='./file0\x00', 0x108) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'os2.', 'incremental-fs\x00'}, &(0x7f0000000140)='@!\'-^\x81./(\x00', 0xa, 0x7) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x205000, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x8c0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, r2, 0x70d, 0x0, 0x0, {{0x5}, {@val={0xc}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x352be5196a3c7fa7}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x44, r2, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1a}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1f}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3b}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x2}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x24040041}, 0x20000011) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0xfffffffffffffe1b, 0x2) [ 357.137851][T12195] incfs_lookup_dentry err:-2 02:59:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x103) 02:59:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xfffffffe, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:31 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(r1, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r2, 0x0, 0x800000080004103) 02:59:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0xec0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 357.179003][T12195] overlayfs: unrecognized mount option "smackfshat=/" or missing value [ 357.189674][T12206] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 357.211990][T12195] incfs_lookup_dentry err:-2 02:59:31 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000000c0)={{0x3b, @multicast2, 0x1, 0x2, 'lblc\x00', 0x2, 0x1, 0xd}, {@broadcast, 0x4e20, 0x3, 0xbd, 0x8, 0x3}}, 0x44) [ 357.229291][T12206] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 357.239033][T12195] incfs_lookup_dentry err:-2 [ 357.250927][T12215] overlayfs: unrecognized mount option "smackfshat=/" or missing value [ 357.283406][T12195] incfs_lookup_dentry err:-2 02:59:31 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x20000, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0xef7}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x6}}], [{@fsmagic={'fsmagic', 0x3d, 0x9}}, {@dont_hash}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@obj_type={'obj_type', 0x3d, 'incremental-fs\x00'}}, {@smackfshat}]}) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 02:59:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x33fe0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 357.306682][ T9404] incfs_lookup_dentry err:-2 02:59:31 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r1) ioctl$EVIOCRMFF(r1, 0x40044581, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sendfile(r2, r0, 0x0, 0x6) 02:59:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x2, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 357.343152][T12224] incfs_lookup_dentry err:-2 02:59:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20000178, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 357.414737][ T9404] incfs_lookup_dentry err:-2 02:59:31 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r3, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r4, 0xee01, r5) r6 = getgid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000100)={{}, {0x1, 0x6}, [{0x2, 0x5, 0xee01}, {0x2, 0x3, 0xffffffffffffffff}, {0x2, 0x4, 0xee01}, {0x2, 0x0, r1}, {0x2, 0x1}, {0x2, 0x4, r3}], {0x4, 0x6}, [{0x8, 0x0, r5}, {0x8, 0x6, r6}], {0x10, 0x3}}, 0x64, 0x0) [ 357.460699][ T420] device bridge_slave_1 left promiscuous mode [ 357.470590][ T420] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.484828][ T420] device bridge_slave_0 left promiscuous mode [ 357.496649][ T420] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.506359][T12249] EXT4-fs (loop0): Unrecognized mount option "./file0" or missing value [ 358.786234][T12256] cgroup1: Unknown subsys name 'perf_event' [ 358.792518][T12256] cgroup1: Unknown subsys name 'net_cls' [ 358.828924][T12256] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.836071][T12256] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.843923][T12256] device bridge_slave_0 entered promiscuous mode [ 358.851063][T12256] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.858224][T12256] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.866287][T12256] device bridge_slave_1 entered promiscuous mode [ 358.902650][T12256] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.909796][T12256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.917204][T12256] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.924244][T12256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.944011][ T150] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.951715][ T150] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.958955][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.968117][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.991642][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 358.999959][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.008129][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 359.016358][ T150] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.023393][ T150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.030751][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.038859][ T150] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.045899][ T150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.053295][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.061309][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.074959][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 359.090144][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.099228][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:33 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:33 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x84) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r0) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) preadv(r0, &(0x7f0000002640)=[{&(0x7f0000000380)=""/201, 0xc9}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/69, 0x45}, {&(0x7f0000000480)=""/76, 0x4c}, {&(0x7f0000000500)=""/237, 0xed}], 0x6, 0x973, 0x13c) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) r3 = geteuid() r4 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f00000026c0)=ANY=[@ANYBLOB="02000000010002000000000002000700", @ANYRES32=0xee01, @ANYBLOB="02000600", @ANYRES32=0xee00, @ANYBLOB="4dac03bbfdd1b888a954858c00e7d855f47b88cc05e15bc33ab916710438649eef3775ab49374948e3f5fce07dee781488bd3cb6925fba4b01e3861b85610fc58430d9282aa0d174f03192f2c7", @ANYRES32=r2, @ANYBLOB="02000000", @ANYRES32=r3, @ANYBLOB="040004000000000008000f00", @ANYRES32=r4, @ANYBLOB="10000400000000002000030000000000"], 0x4c, 0x2) 02:59:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x3, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x200001b8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:33 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={[{@xino_on}, {@metacopy_off}, {@metacopy_on}, {@xino_off}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_auto}, {@index_off}], [{@dont_appraise}, {@hash}, {@smackfsdef={'smackfsdef', 0x3d, 'incremental-fs\x00'}}, {@hash}, {@fowner_gt={'fowner>', r0}}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x103) [ 359.140089][T12262] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.147832][T12262] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x103) [ 359.208392][T12263] incfs_lookup_dentry err:-2 02:59:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x4, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x7ffff000, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:33 executing program 4: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x141) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 359.233721][T12270] overlayfs: unrecognized mount option "dont_appraise" or missing value [ 359.262167][T12273] incfs_lookup_dentry err:-2 02:59:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x6, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:33 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0xfffffdef, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 359.276465][T12270] overlayfs: unrecognized mount option "dont_appraise" or missing value [ 359.690754][ T420] device bridge_slave_1 left promiscuous mode [ 359.696908][ T420] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.704657][ T420] device bridge_slave_0 left promiscuous mode [ 359.711157][ T420] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.975417][T12273] incfs_lookup_dentry err:-2 02:59:34 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') preadv(r1, &(0x7f0000000240)=[{&(0x7f0000001180)=""/4096, 0x1000}], 0x1, 0x4, 0xde) r2 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') syz_usb_disconnect(r2) ioctl$EVIOCRMFF(r2, 0x40044581, 0x0) ioctl(r2, 0x3, &(0x7f0000000100)="143f7898d8ad2210d8a82054783f86816108cc8b47a7ae5ad4ff7d698de6a551eb73e6c8a580257ef693cbb9772371d66972314ae910d510a3825ae71f726a16834b982172b3bfd72bb42063f0c0eb394ab76fdbb5427ee5954056d6178d396b51e4f56ccfe400") sendfile(r0, r1, 0x0, 0x800000080004103) openat(r1, &(0x7f0000000040)='./file0\x00', 0x4c0000, 0x160) 02:59:34 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x82) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:34 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x9, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x103) 02:59:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x2, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 360.183695][ T9404] incfs_lookup_dentry err:-2 02:59:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x10, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 360.229628][T12307] incfs_lookup_dentry err:-2 [ 360.235453][T12308] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=12308 comm=syz-executor.2 [ 360.252609][T12311] incfs_lookup_dentry err:-2 [ 360.257557][T12311] incfs_lookup_dentry err:-2 [ 360.270907][T12311] incfs_lookup_dentry err:-2 02:59:34 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xee01, 0xffffffffffffffff) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) r2 = creat(&(0x7f0000000080)='./file0\x00', 0xd0) ioctl$KDMKTONE(r2, 0x4b30, 0x8) 02:59:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x3, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 360.294244][T12311] incfs_lookup_dentry err:-2 02:59:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x300, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:34 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:34 executing program 0: mkdir(&(0x7f0000000040)='./file1\x00', 0x122) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x1101800, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r3, 0xee01, r4) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000300)={{}, {}, [{0x2, 0x2, 0xffffffffffffffff}, {0x2, 0x8895552551c4238d, r0}, {0x2, 0x3, 0xee01}, {0x2, 0x4, r2}, {0x2, 0x5, 0xee01}], {}, [{0x8, 0x5, r4}, {0x8, 0x3, 0xee00}], {0x10, 0x1}, {0x20, 0x3}}, 0x5c, 0x3) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) syz_mount_image$ext4(0x0, 0x0, 0x1, 0xffffffffffffff31, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x3) [ 360.356848][T12323] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=12323 comm=syz-executor.2 [ 360.462197][T12335] EXT4-fs (loop0): Unrecognized mount option "./file0" or missing value [ 360.537595][T12339] EXT4-fs (loop0): Unrecognized mount option "./file0" or missing value [ 361.007080][T12344] incfs_lookup_dentry err:-2 [ 361.007139][T12345] incfs_lookup_dentry err:-2 [ 361.016357][T12345] incfs_lookup_dentry err:-2 [ 361.021214][T12344] incfs_lookup_dentry err:-2 02:59:35 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:35 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x90, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:35 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x190) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x4, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 361.236673][ T9404] incfs_lookup_dentry err:-2 [ 361.244674][T12349] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=12349 comm=syz-executor.2 [ 361.261705][T12351] incfs_lookup_dentry err:-2 [ 361.300065][ T9404] incfs_lookup_dentry err:-2 [ 361.744085][T12361] cgroup1: Unknown subsys name 'perf_event' [ 361.750350][T12361] cgroup1: Unknown subsys name 'net_cls' [ 361.786873][T12361] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.794325][T12361] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.802264][T12361] device bridge_slave_0 entered promiscuous mode [ 361.809158][T12361] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.816547][T12361] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.823982][T12361] device bridge_slave_1 entered promiscuous mode [ 361.860647][T12361] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.867816][T12361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.875134][T12361] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.882317][T12361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.902804][ T150] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.911205][ T150] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.918685][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.927482][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.936892][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.945058][ T2025] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.952091][ T2025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.970911][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.979228][ T150] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.986277][ T150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.993643][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.002286][ T150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.020281][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 362.028752][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.037007][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 362.051128][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 362.059828][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x5, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x600, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:36 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00', &(0x7f0000000240)=""/191, 0xbf) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000100)='./file1\x00', 0x4) 02:59:36 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, &(0x7f00000006c0)=0x80, 0x800) sendmsg$unix(r1, &(0x7f00000005c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000240)="21110d972cc7125fe20f196da66da1ed5f96490d161698f36efd0f674dd93b597d643c8a24fdb7f4a2182624ef06251f43a9768e161e70847b245b30c74ecba90711dc2be20ab86ea60677e4f162c41073df27b43a3f3a482983ba05b86488abe5040df17e4c7110fa7508be9b6a1585c6c311cad8b905814d690a4034bf8155c6b883f5b9dca7b32632a03dbd66aec4d93dfb28af74e911d28631037ffb1b150335a73d0aaebcac19c882475d2f294ef37be0", 0xb3}, {&(0x7f0000000300)="e03b2e452db6a31b55fc16a46c461c50408e108d8ab93c01aa3d5f7b8d4878ba5ddf726956ded9419af835a52a9ff4691cdd251d72514a6a7f53f529cb6c92d180d43ccf4b6b24673a9e08187780629173eb3ea9f27a1fda8d65683a01aafbe1faecb86c077d5cbd132d53cc358928e6072ce420f7573f73d13737f1695e43a826a51b566c538e9a7a4517dff7f52a8971df21f009d3e76c10be0d6b1113a0eca4175a1d1e429c7536f4c0184401a1ab889d90515d00098d7c4e31fd5bde6fa29a504245d661d266e9f420af4477c40f06e228cd9dbb70133d951114c5c475df28c3a0fa83ecf428c09609", 0xeb}, {&(0x7f0000000400)="2bcd282d7747173cc4d87321712e35e42637c9c06f6ef11b45d7cb555b5fed796dbc0fbc6e06cf2df1961e8d899c41a4b9f91f5a0d8f2a4b2ba28acf0bf8a3fed1c52585ab150c351cfc1e170dd105c9708e310b00498758eb2a780ac82692b72df3b7124ce2a0abf4e39dc187ad98c1bf468763acb8877ce6817c1690a01999bc", 0x81}, {&(0x7f00000004c0)="a8024752a784661901ad5c6778cca751006027db7f8f57379f068cf6d2066af790b5b44d38d6b873e348170b197abfcb2f714efb6a172032cf1b033edab24c8727738bc5af3d63958a0a255a173a9ef69ba0b9aad944e7fab36d877fdb26963c686969c668f8852c9e963d5b963593810684fe65093cbd44a6ee3fa7cf2d4dcfc918df744fb9383376305cf9c0651652b0324cd0a14d8458267f20b4319747c336782d8c865a5d92186c2ac632733d5d25784703ed72", 0xb6}], 0x4}, 0x48001) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x93041, 0x8) 02:59:36 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x10) 02:59:36 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x5, 0x7fff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0), 0xffffffffffffffff) openat$cgroup_ro(r0, &(0x7f0000000380)='cpuacct.stat\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x800000080004103) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000140)={0x30, r5, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6}]}, 0x30}}, 0x0) sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000001180)={0xfe4, r5, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_PEERS={0xfa4, 0x8, 0x0, 0x1, [{0x458, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x204, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x13}}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x26}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x4}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x33}}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ALLOWEDIPS={0x248, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x30}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x24}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x6}]}, {0x588, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x278, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x2bc, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5, 0x3, 0x1}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x7, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @empty}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x9, @private0, 0x7}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "870a63f5a4e33577f2c07e65755be098d363dc7deb22a96b0fd5ad9ec363d7bf"}]}, {0x15c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x158, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}]}]}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}, {0x3dc, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}}, @WGPEER_A_ALLOWEDIPS={0x39c, 0x9, 0x0, 0x1, [{0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x44}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3d}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x5}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x1, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x9}}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x80000000}]}, 0xfe4}, 0x1, 0x0, 0x0, 0x4000}, 0x24000800) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x58, r2, 0x1, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x74d}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004000}, 0x84) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="01000100", @ANYRES16=r2, @ANYBLOB="000125bd7000fddbdf250600000008000500e80c00005000028006000b000200000005000d000100000006000e004e2300001400010064"], 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x800) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x170, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x10000}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2b}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2d}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_macvtap\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macvlan0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x8f3}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1182}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x10000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x10001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xad}]}, 0x170}, 0x1, 0x0, 0x0, 0x40000}, 0x48810) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r6, r7, 0x0, 0x800000080004103) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x30d443, 0x100) ioctl$TIOCSTI(r7, 0x5412, &(0x7f0000000000)=0x8) [ 362.105442][T12367] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.112946][T12367] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:36 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00', &(0x7f0000000240)=""/191, 0xbf) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000100)='./file1\x00', 0x4) 02:59:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x900, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 362.186215][T12368] incfs_lookup_dentry err:-2 [ 362.196044][T12373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=12373 comm=syz-executor.2 02:59:36 executing program 3: r0 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="d8", 0x1, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) keyctl$revoke(0x3, r0) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:36 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="03f4402265604ff5b1ed50918cb392bb8908a441756d81b767ac02d9466e7abc5138d57e568d5732afe2cd9651dbd43a9d1cf1b577bab77ab9106284a433a7982d51583649298fece7f571c40ec745a0e4deaa94204e500f6596501e7ebba0f48ffeee219ea16408e82bfc79498df1fd7717968017b3eec02908f3fb800b857766715d0fdd43a6fc79613e589b5aa58f95215efbd7d798", 0x97}, {&(0x7f0000000240)="1006e3bfa4980a4aa8cd1f02630f92019f967c4b2300437402b17149d6c7364ccae576e21bd90522c04161c79255337dda0e87365e397bb853161ad0845640f89eb3ec5ac84933c7651ad6a61c3170790d3a897195583126291f454e5e49d3bc48da01b0028aa98a48de55b9b5fd84011832c85290eaa230cc8e0cf649da50bc3f1e1dc3a827e05ada969cf9525015e31903dd82046634b7567fd9c81d4803fa52b4e12cc6fcc0ac9dc1e8c500ece3d63d72831f6cbb6a79312feb6b787acab9e00fb73edbd3d9d1133e5543518b10", 0xcf, 0x8}], 0x22500c, &(0x7f0000000340)={[{@auto_da_alloc}], [{@uid_eq={'uid', 0x3d, r1}}]}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004103) 02:59:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x6, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 362.253792][ T9404] incfs_lookup_dentry err:-2 02:59:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x1f00, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:36 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r1) ioctl$EVIOCRMFF(r1, 0x40044581, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001980), 0x880, 0x0) r3 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r3) ioctl$EVIOCRMFF(r3, 0x40044581, 0x0) r4 = memfd_create(&(0x7f00000019c0)='\x00', 0x1) r5 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r5) ioctl$EVIOCRMFF(r5, 0x40044581, 0x0) r6 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r6) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000240)="73b17246fee34c606b731ec852daa6c7dc21d8b57375c08c5ac87a9d8d66fe7521eb6dd6f77c886cd1c5fe1fd49f04f42ef1e783c36bb661c0934d411e66821792f7f81dab7c1feb1dcccb2802ccb292d4bcf861e33e9c0b968c68e40814b5710f58e6d11afacab0b801e0947445", 0x6e}, {&(0x7f0000000640)="5a7bea85adf84bba32fda44903a7a40e33555d1d9cb555825e8f56cbe889090dd9fff36f4f7d425de4eed53855662bc334b7172a08fdf90ad206daaa244c411099c10f7170700bcb884b209be74e3f231add65a45a834f829a354741edaab9c59fd6bc5369d4cb73229cc3b2ca9cec26a88bdae4d76950a698adad325be2261a819d660860cad3351cba56799f5e072d34fd1db2598a6dc4f5bdde02a0aa16f5cc9c9cbe08ac73f322a0127f642789678715bb5234fc6d241c88c124f012b6fc9dd2ef520e0d29866b82d19f8a48073b81986beadd6d64be270c19e97066e33e6e768875e21c2578139ed193f95d684722f5ce195722e523a1a5e3a4d34427c00bc2fef14cc9e6b4f6db92e0fc6c1c77ae09b94d1b380371154937423f9e475db80d9a45185022dd023ab6ed0851f372d442f8789ced147fb97b2469ba5cea29283ef3d46eaeeb39b2a2342779ed642085e87b48a5e7a167c449b137ee98818bf3bc2ae9fd81036f37cccd8e052422e652253119e68241f539550f010ff015332a95fec5c91d76e1a1190e5a78e890f3023376cd6d6dd1f4888f742d71aa3c20b965362fd4a73f7cd46de9194d742ea7da54b1152a8e55a1fbc5ae4065bba123ac4d609b079af060d92e8996bce14828c01c63ad2ea02c1217bf9c8492aa47e85c15dae8869c99b00ef8a1c3b6dfda94b0b5756cc243879897dbf0ab3ac0398a20d76844dae37cae9e3f3249a24966132ee2ba7b7ab99bacb216b032e5f19a0d5f31cd25047df897be57689ec556313f56d6b81664036deea92b3c82a09b26af6b36263715a883a0e89d83381e2c6c4310f958ee9f1f67ec19471679cf66d6bf9c706e2841f0a1d3656992b4de92a6b4e151d9c69f520361ff8d97b5180e31fce64595809628e026e40f8e64683ab349eb41bf06c2c22848e87cc432a7baf92ab512a5e73d78385a40a92b5c7cb0ce57fd1f0a91b3242adab21baed7c3073acd7e96a81be9f502783ebe7778dd51e24aae863138045740880e8760e479e2fccac52624c47802d649cd6e393ce39ad77ce57ac83472f3618f6eedfb426eccd5a6314d737e183536a939a95b55d2c328c0a0dc2a9d40470899375f63235b594504e51d35c888a33f062e84b63a7bec2d1ba5cb1caa93683b20a3d840d905a8959fb5df4b9b328a7c818d7abe35df09e248a43a507d59fbcb2545cb42577d46ec78050eeba4b786d35ec7ac2713e5ebde84c955bd89614461b71d9cabd25226f05fc17b97f216c230059bb57ba0060b80063edfbe316daaa899a1087849c15364db88df162eb5adfcdbea1ca43d200cda7e13305b4acedfdffda3f1e11af5fd3cc21327080712b69361a67faab3fbe5ee8cf3afb08e9d2bea3bce4dc08769f2850cdfad4cfa557b39e2a21ce1d9cd09d6fffe3cf392314af75fd8419cabe71fba91e21ca99ddbb27036fc570649b69c74b0fae3629e0d6ed7326fe7eac01174e7d40d0077313731a8e1c7c0f51f04a481062049ca6369b5b557c6cb0948e5c2d4893180b4a2472d194919449bf6b8df3d46542b4c0edeba23135d7e26f8f51893021f0d7e2a61d6a96a647814e4a0e3591a5abf89665e5232867478df0d047ff93eb6967bc20659db200f853a7129836547357a92fbf584b1d931d7371c3b2cbbeb3c6516d4d9f14b9036244197752d9675d5e0cdb64e1c9a1522019674a4f6cb76ee81599c3a70b3446635a6bfac9cb21e13edeea85a161793ef3e34c3c12de1d4d2883046b77d51cf4b5cb228c21c3c714e9eb30fbd7dc4215f664e8893c6338b11a323310a6aa43709049e185cb576b7b0ecad5cc1058d2252ab2fc950f16af347a2fe4c930fe615f0e760c712f3be965b3f387c8878bab66828a56f02006f462c450d436640fe82c50007ece3bd3eba04fab52696a9bc873614860ac38d856f93c8aa654315645cbdb8d3f9bc1ed933de49abbf72696fe1c9c89c703ee6e73f38908812099d59610b2bb25afa319b9e09d2400e2a41797ff84f5e401abe231b278115c48672053e54ef0d17251e7460258ce270cfa517915c787cbedd62a59b83c185853c217b62c24a157b5f827a94ccac0abae19c27d0e11208f9e59dfb7499abdf056a8a1cb3486ade3bce423320b490b99ef15f16f3d7c3a6737b27f7c55065cd69bcb959af3e03a46e946e4546bb6dedf111ea674729ea1e941698778adeb9f4bf13556733a1fc5e2baf3f7d5da2f7319c787e4bb462b16ec9ba97009e43a73a8ef7c15b5cd34a017378d9ff6d8220d73f8d5da0d7c462abee0c9d4e20d6ad9790d906dfb8df3d5e3da6373e8052f566b8d31b47d344a778e46ea4f2e634567ae3f01a4b37a2bfe8a014bfec078803f4f2c7bff5202c1474981ccfbbcd1ebe75883b438b92c39446171f57057846738ff47fa98562bc7ae80330b920946ea4b64446790f7c09705d1ca1377d005a0d27e3d86fa8f0daa15719fb58c1302a486e1113bdbc37561c83317d4be431ee2ca6d5891b644d8b808719678a2e7085cb64928f3cf04d18185a1ba0119ccda51e1c1b8656cf7bb1d57749645fe534c8150a2862c42fce7dcfaacb30c9b78b77cc614ed52be85671d6bf205890134fe5d23ee819c94d961115da31e5f7084f3cf7b6f80cbce3bac321d2953aac641110a652e2a93194a9db637a07a48354ff0d830a5896662932630e07ae2e102b85225042fac7b93038baa46e8ad82d3a4d266cd2035caad1b45f472eeaa18306194d96465a32c542ba20340157555b89bfc8d3e50b31f7cac2a74a9e09a5a5c69840f1d8d30ae305431b9074a42109edffdd1a6329adb65ad844a6e09b028976b590e31f318132d0b41b8cfb514b97f7cb036b5699538d3cb586b55c9df0a0660bb304f12d478e59b83c9997ad37dcea53fd683b3438a7cd4cc694d6387e46ad208e2ba4593d01b891c5c650d7ccdff4b1e0d3cfebc58a9511e085c990682b3d503656d1cbd9f2de30c14f118e628cb1c8e09e71304830bd245ab7885558ddbc59b40a6173b2656b22be689067037ff3207efe9863cc1179be94faf791a01b0d32b901431dadfd9aca2fc239b6edac6ece7c53ecba78136d93ea296d2822d9cb7ef561facac4b707a4fe61bba7c3a0f0893a24d6d3b7d29c071dcc230ef4a47c606d5f64be1111b0aa0005874541e325198ea7a9abee51b64aea9375e24813f0215558fd5343f9edfc972c46f45bef91ffb885d5e7f07652fdc98f2517200764168978f492dddf1f0049cccc7cf5f519ad7e42f870d6cdf11633249cc766587059f8b3ac82ad4723d7bd23b0786ffc47082db60f7cc8e6f193321de04c308d101ffa4fe4e3a881c1eb2e64b746db4d5d2c7cdd2b5be73d3f6ab04869781990fd36934431006d387dd53db5d22967f4ab6278d025e7ca81e01cf735b1f5c7e8b3bb358827fa27fce0f68e3ec6275a57a684ff1b50194895530ca0efe2924701fb53a1ba3c0684c5a97ea8c45a531f2b280875ac590686a872cbc6d1f6f55328b2012f8c0680054c7c786a97d4c79148a489e478b8fb253b4314b807b4b6556c68476ad0a171641f8a71ee581e4e0f8361168d285b59fe15ad4c44c617e7786108de96ffdf08ac33317232cae77b73aac62cea6e83258aa8a2c74ae7d57121bc8d599e57160253dc100ca6a7c9bdd153584d735bdc59380820687d9dbfb301e5b1d8eb4ce791ae999a0d202e6f2be32758138a50e93870e53647a08a02a7e6415810306e0a72ea40f67b0348f5a15504e4fa9ecf796aa83b85446a14ed516f14143a8d1c2963e98313a6e3480c7ed4bb9a948e0574ec84bc0dc07c57cf2f5398a8dddbd1e7290b27c6145cb27e451ff8cadbf212eb843641ea0335301ab231dc85dc12d61f0c6bf2ca30335639fa7447493100c8efd3917e0a1073622974e39f7b5d8b279566f9c00573d7f2bea262c33ae59b568a1984d2b2749a5c814127db01567888f21f1006b9acaeff6ddb8869ea42026cd297db493a4f3f55d9db1fef0a348c4f2d95373b52a2cdd22c165546d51c01480204540926faa01c8a11d1c174ada670af20532605b895c4921aa292e56a5dc134d8080196639d45459032473ee18c7ee3c61790e57f146d06f79c00efd75329dee13fdb5729a09f105cfac55ddcae4a5227b1cb1242681b8c5d4db71c41f09d99f249db1646c3c3943d0be5db94e473e81d6e46a83b25339daa7cb0c525bb062dce674a91765dc52b97d51c2f5e20241258bdb41728b8085a81a6dc3efdad38bee98d4c0fc165e54b00e228027eba28c217cf7274994f398984cc89247b78db41defb4ccca662b98405a45d17db9fd85d0fdf2e515b39f4afa16c4fe37603d18f79c783d1807da5f5c0043b6a1acf09ecd7e457c1a5e6131c6b24c479eeac444a53d07b4f0aaa81888283bd8e3feca2b96724df7a1452bf6a9a9532d802d601caae3601724a7eadac0b7cab707b693cc9e00b3a73c92e84c0b93af974285010a46d6eb9572f67eadf27b42a598e2e692c31bd50e8fed1695de1b05213d0388ba48b2fd23490e027ce8e43ff8f088ed82e478be3e8367432ef776564f965e5cdab5802a48e49c627da84ecd5c1f593c579170f5dc695bf5367809bba16ce2e998ebb9342f9813ca659ca96bb16cb19d79ba76ca1f2f209726320bc7dbd91832e1447d4dd32f0f01e68dd1d7567ff4d5f054c05c1612859e0fea4fe6e390aed8b5c9451ca31868c53a6e17df12cf64d22defa6c92b305d6b69f6a074d6c6be3bedc7e56ee6834071088ff0aa021041642aa4313d6ee26fd6824ea46bda2299677bc3d39d6531571d40091759689508ac821dbb4efad214aeb88357467ee73e73cd3a4294589b31e0760e0a8452e01787da5dba9c05c24029401346e89475bd6316e803be44a891a5b7b2ea22400b941e7abf8b1358ac955734271212869ecc9c2b037482246857bbac222bfa34685e4c894c3e8e724a2b6cd1e7784dbac141f71a6b9f366866735cfaf6145f897c41880c04087a585619cc904a781b2fd0768b2cae58282e8b5b69eaf6f059711a1046c4b828e7c1958248dc9e58ee29b22057a2e6c979738bfee8477d4c02dcd592e00e3194968f2ea8fe6d54dbdbbefd92e0b0c6c477b5418eb22b782920acc2693a6d6acf0ca88b76e919454892e1c9ae05721a690df7d50e0826dc8485e994201f3879c6c8a328d0921756de0580c8c221942e95e856f2bc63fac8d70df82bd7cd414b7fbebea70c63b7285a42134db46c2d07656f9cb06a68a1784f1fcc934fd9099925fb6f99d4884f510607a27d6bb0b95e1f9247f0876027ebf1c92a3d32892a3bc71bceb750a3b73fc1c34cc96958836027d40178c8c96f5d2a2de6adb7d4ba36409dc6458d192b060b458c9cf4fbd0cf012bb3665886b5847a610bb8cdf97fa55c86bb95ce7a61515d3fefdf66fb0c44e271cc6e07ffe11b6ba4fd72ee87e923dc95e2cf7125504138fd6fcfbf3bdbb765c42ea2f91e9b06b08d48608b1cab3780d396e5e8b4f4273ff509c5055a8edaa8923bb78d6d76eb1caf12e69fae5a42668f208d630df266c37826886cd5e88d8669d11bee0b002f25e0c4e5aae0014af7b118b46e265a9b4dadd4a657c59526aa6641ff2804e3b7d25c6264a1df106e44c4520c96ecb755e42942660abbaced369b3cb6a7149166aa7eacbb19fdce649d1a645c9f4ff37f2260a058b0ffc36cd01fa6f0a7c6b1c1c424b3544133b64e0c3d96519218dca635ce939400debccde4853657eb34cc05385b4120a", 0x1000}, {&(0x7f00000002c0)="bd259d848cd9cbdc79700ffc844e90ce43780ff03416aac8d4b81984e1bf0373ad354cbe7cad9e7696926763f7a08f3885a350c562c7c2b7490b269a147cb4fd421ce1a387f99590311e06dcefbb7baf35fbf5ef25fc3bbe470b10f2a1bca12a7c26a37bdf05a0bcfd93651333e329513cbea1b2f65aa8b4e69a05dc9687b078d1405988a0a5b5fdc0ad4de67d65bb6c5b2bcf2a766899e83cbea603de0b520543352e1c8e8315a3c5ac416106a23e9797c3ca9500", 0xb5}], 0x3, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r0, r0, 0xffffffffffffffff, r0, r0, r0]}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0]}}, @rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [r0, r3, r0, r4, r5, r6, r0, r0, r0, r0]}}], 0x188, 0x20000040}, 0x40800) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x2000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x7, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:36 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x9) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x110000, 0x50) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000001140)='net/ip_vs\x00') sendfile(r0, r4, 0x0, 0x800000080004103) [ 362.313984][T12389] incfs_lookup_dentry err:-2 [ 362.330709][T12393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=12393 comm=syz-executor.2 02:59:36 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x20a0889, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40801, 0x40) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:36 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getpgrp(0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/wireless\x00') sendfile(r0, r2, 0x0, 0x800000080004103) [ 362.417808][T12410] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=12410 comm=syz-executor.2 [ 362.446511][ T9404] incfs_lookup_dentry err:-2 [ 362.487016][T12415] incfs_lookup_dentry err:-2 [ 362.540793][ T9404] incfs_lookup_dentry err:-2 [ 362.680456][ T420] device bridge_slave_1 left promiscuous mode [ 362.686640][ T420] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.710363][ T420] device bridge_slave_0 left promiscuous mode [ 362.716517][ T420] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.887637][T12429] cgroup1: Unknown subsys name 'perf_event' [ 363.894096][T12429] cgroup1: Unknown subsys name 'net_cls' [ 363.931792][T12429] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.938941][T12429] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.947003][T12429] device bridge_slave_0 entered promiscuous mode [ 363.954708][T12429] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.962254][T12429] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.970377][T12429] device bridge_slave_1 entered promiscuous mode [ 364.012177][T12429] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.019474][T12429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.026791][T12429] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.033855][T12429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.054216][ T2081] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.061524][ T2081] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.068800][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 364.076974][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.086621][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.094990][ T2023] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.102036][ T2023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.120815][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.129082][ T2081] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.136206][ T2081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.143898][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.152054][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.162770][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 02:59:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, &(0x7f00000000c0)) mknodat$null(r0, 0x0, 0x2000, 0x103) 02:59:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x4000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x8, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:38 executing program 3: mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:38 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r2 = accept4(r1, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000000)=0x80, 0x80800) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="88000000", @ANYRES16=r3, @ANYBLOB="6ffe00000000fddbdf25030000007400018038000400200001000a004e2200000008ff010000000000000000000000000001010400001400020002004e2464016d00000000000000000038000400200001000500000000000000fc020000000000000000000000000000000000001400020002004e24e00000010000000000000000"], 0x88}}, 0x0) r5 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r5) ioctl$EVIOCRMFF(r5, 0x40044581, 0x0) dup2(r0, r5) r6 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r6) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, &(0x7f0000000240)=0x1f) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="f3c80196a8b164ccaa92a5d9c0318068e0574310f0a4f4e1275ffe708000160e15a1b921969da0d19fb4cd27a30cb0c905000000f95deb867cf428b9725f25ace84ad43cf20e316be1658f580731b42137d23a1a878f8c1b76eaa5476a9e7916bd374b2a98524e1f6b22f4d20f94ef29c1da776c2efc5a4d2743ac827e8479274b6f840000", @ANYRES16=r3, @ANYBLOB="08002bbd70007ddbdf251300000094000680080001000600000008000100ff0100001f0003001873c71ef1cf9487d8a1fa0dac18824d68fe765d13922166bed55b0008000100060000004300040067636d28616573290000000000000000000000000000000000000000000000001b000000cb8ae376d3dc9806f0f215801fd8b9f4112afd78ecb2fcbcaf30370013000300030ef749e548a43f99a963ad3cbfa700"], 0xa8}, 0x1, 0x0, 0x0, 0x44}, 0x10) sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:38 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x20, 0x0, 0x0, 0x820000, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 364.181139][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.189358][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 364.202681][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 364.211066][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:38 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x1008, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 364.293574][T12440] incfs_lookup_dentry err:-2 [ 364.296522][T12446] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=12446 comm=syz-executor.2 [ 364.313230][ T9404] incfs_lookup_dentry err:-2 02:59:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x8100, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x9, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:38 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x1, 0x0, 0x0, 0x50000, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:38 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x20) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.opaque\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xa, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 364.382267][T12451] incfs_lookup_dentry err:-2 [ 364.388277][T12459] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=12459 comm=syz-executor.2 [ 364.411647][T12449] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.419507][T12449] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.461762][ T9404] incfs_lookup_dentry err:-2 [ 364.463790][T12473] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=12473 comm=syz-executor.2 02:59:38 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x1, 0x0, 0x0, 0x50000, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:38 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) quotactl(0x6, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000140)="89a7072e5d018465509e710d18b2358989a150751a37dd") mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x10000, &(0x7f0000000240)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_off}, {@nfs_export_on}, {@default_permissions}, {@xino_on}, {@metacopy_on}, {@index_off}, {@nfs_export_off}, {@metacopy_off}, {@metacopy_on}], [{@dont_appraise}, {@seclabel}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x63, 0x32, 0x38, 0x31, 0x62, 0x38, 0x36], 0x2d, [0x61, 0x30, 0x65, 0x62], 0x2d, [0x65, 0x36, 0x30, 0x30], 0x2d, [0x64, 0x64, 0x63, 0x63], 0x2d, [0x33, 0x30, 0x38, 0x38, 0x66, 0x34, 0x34, 0x36]}}}]}) 02:59:38 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0xfecb2da1800ab674, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x10033, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xb, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 364.574131][T12481] incfs_lookup_dentry err:-2 [ 364.574410][T12483] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=12483 comm=syz-executor.2 [ 364.591627][T12485] overlayfs: unrecognized mount option "dont_appraise" or missing value [ 364.592720][T12486] overlayfs: unrecognized mount option "dont_appraise" or missing value [ 364.629754][ T9404] incfs_lookup_dentry err:-2 02:59:39 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x10d) sendfile(r0, r1, 0x0, 0x800000080004103) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)) 02:59:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x34000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xc, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:39 executing program 0: fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000200)) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x20000, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)='system_u:object_r:mnt_t:s0\x00', 0x1b, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x8, 0xfffffffffffffe75, 0x0, 0x40, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', 0x0, 0x51, 0x2) 02:59:39 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x1) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x24) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffffa) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r1 = geteuid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x282080, &(0x7f0000000440)={[], [{@fowner_gt={'fowner>', r1}}, {@fowner_gt={'fowner>', r2}}, {@dont_hash}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, '\xc6*['}}]}) mount(&(0x7f0000000140)=@sg0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x24080, &(0x7f0000000380)='nfs_export=on') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:39 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x1, 0x0, 0x0, 0x50000, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x400300, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 365.380218][ T7] device bridge_slave_1 left promiscuous mode [ 365.386771][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.394087][T12494] incfs_lookup_dentry err:-2 [ 365.398944][T12498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=12498 comm=syz-executor.2 [ 365.422203][ T7] device bridge_slave_0 left promiscuous mode 02:59:39 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x28, &(0x7f00000000c0)}, 0x10) sendfile(r0, r1, 0x0, 0x800000080004103) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0xfffff5ec}, 0xc) 02:59:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xd, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 365.436045][T12506] incfs_lookup_dentry err:-2 [ 365.450973][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.462852][T12506] incfs_lookup_dentry err:-2 02:59:39 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x1810, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x400000, 0x0) 02:59:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0xe, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 365.500497][ T9404] incfs_lookup_dentry err:-2 [ 365.502405][T12516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=12516 comm=syz-executor.2 02:59:39 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 365.570173][T12518] incfs_lookup_dentry err:-2 02:59:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x1000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 365.591532][T12523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14 sclass=netlink_route_socket pid=12523 comm=syz-executor.2 02:59:39 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x10800, &(0x7f0000000100)={[{@xino_on}, {@metacopy_off}], [{@hash}, {@fowner_eq}, {@subj_role={'subj_role', 0x3d, '-}(%[\xb7$\\'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x11, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:39 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x200, 0xc5) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 365.656022][ T9404] incfs_lookup_dentry err:-2 02:59:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x2000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 365.708603][T12539] device bridge_slave_0 left promiscuous mode [ 365.709635][T12536] incfs_lookup_dentry err:-2 [ 365.730539][T12539] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.767076][T12543] overlayfs: unrecognized mount option "hash" or missing value [ 365.798075][T12547] overlayfs: unrecognized mount option "hash" or missing value [ 365.830649][ T9404] incfs_lookup_dentry err:-2 [ 367.152652][T12552] cgroup1: Unknown subsys name 'perf_event' [ 367.159070][T12552] cgroup1: Unknown subsys name 'net_cls' [ 367.195224][T12552] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.202641][T12552] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.210472][T12552] device bridge_slave_0 entered promiscuous mode [ 367.217525][T12552] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.224783][T12552] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.232373][T12552] device bridge_slave_1 entered promiscuous mode [ 367.268205][T12552] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.275274][T12552] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.282575][T12552] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.289591][T12552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.309493][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.317159][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.325557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 367.333421][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.342698][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.350981][ T2025] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.357996][ T2025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.366990][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.375166][ T2081] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.382238][ T2081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.401028][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 367.408948][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 367.419232][ T2081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 367.430926][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 367.450617][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 367.459033][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:41 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f0000000100)={{'\x00', 0x2}, {0x7}, 0x38, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)="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", 0x169, 0x0, &(0x7f00000003c0)={0x2, 0x11e, {0x1, 0xc, 0x3b, "82aa72e82571fe1c4157e2710018851e9ae8e4facf3c639e5402d71aee01dfe46a16b650c7c240bd23cf9210414f0ef664a2bce95337e038bc5c5e", 0xd6, "7ddf8145cf4de11c11553fcdd5b06560a5dade56f11c1e5c240deacd9ae507ed424dff5f590370ef1963f92abb7c897aa7ecdc7cff73597d227eb950265f5f51207b65fa476f2251c2c20d343b6e9009237147ae2f78c0f9dfc87f6d72c637209d89f3108771aa03a5e24df2a2576a1a0f2a2687665ef8d7b0a16d095df452cf30baf746a343659a607c94e8c28336dbb8c857bc60656f82c2ff98571532316fcad659c506dfdaf68d939841fef49e27d8a3666bbc4cd0db76db80b77f42f3ce8bdabc05020f8a0dabc58acad1a16178f4124c6ab159"}, 0xaa, "2dab5e666079b7fc21613f8d57a0dfaf13c0c6f19593f74170fccf3e728eb9e7459e7326f88809003e07fa2b7013b1102287d2d032f7dcd164277e618a547276564695a7fd5fd05d4be99d3ac6ff8e9e9a2d6f9dcf25f1fc257cac083eda509eb73849a90abff52ea051c1fb35afce65aad7e9c13f01a0d6df8ac71d410ec98c02e80c8bea8b5508ed86523b46aa4e53956e665fe92632c9e7d4047c0c9daf71a371c6f2db16af9dc55c"}, 0x1d4}) sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x3000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:41 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) openat(r1, &(0x7f0000000000)='./file0\x00', 0x2, 0xb0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000100)={0x1, 0x20, 0x0, 0x2, 0x80, "14f9364f268b95d6c3abde6da14b0538212b62", 0xfee0, 0x5}) syz_open_dev$tty1(0xc, 0x4, 0x2) r3 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r3) ioctl$EVIOCRMFF(r3, 0x40044581, 0x0) sendfile(r3, r2, 0x0, 0x80000000) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) r6 = getgid() setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=r4, @ANYBLOB="02000700", @ANYRES32=0xee01, @ANYBLOB="15011b00", @ANYRES32=0xee01, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=r5, @ANYBLOB="040001000000000008000100", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32=0xee01, @ANYBLOB="10000100000000002000000000000000"], 0x74, 0x3) 02:59:41 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 02:59:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x12, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:41 executing program 0: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x44, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0xb}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private=0xa010102}]}, 0x44}, 0x1, 0x0, 0x0, 0x1014}, 0x40040) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x99e}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x2, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r2}, @void}}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x8090) [ 367.468019][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 02:59:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x4000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x29, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 367.552292][T12560] incfs_lookup_dentry err:-2 02:59:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x6000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x6b, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:41 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x80) chdir(&(0x7f0000000040)='./file0\x00') 02:59:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x9000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 367.635148][ T9404] incfs_lookup_dentry err:-2 [ 367.673929][T12592] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=107 sclass=netlink_route_socket pid=12592 comm=syz-executor.2 [ 367.678353][T12591] incfs_lookup_dentry err:-2 [ 367.724055][ T9404] incfs_lookup_dentry err:-2 02:59:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xff22, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:42 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f0000000300)=@sr0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='zonefs\x00', 0x0, &(0x7f00000003c0)='\\{\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200, 0x8) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x4000, &(0x7f00000002c0)={[{@metacopy_on}], [{@fowner_gt={'fowner>', r0}}]}) 02:59:42 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x24, 0x0, 0xbb269987621af008, 0x170bd2c, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x1}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000891) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff81ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000540)=@id, &(0x7f0000000580)=0x10, 0x0) recvmsg(r0, &(0x7f0000001a00)={&(0x7f00000005c0)=@tipc=@id, 0x80, &(0x7f0000001900)=[{&(0x7f00000006c0)=""/216, 0xd8}, {&(0x7f0000000640)=""/52, 0x34}, {&(0x7f00000007c0)=""/140, 0x8c}, {&(0x7f0000000880)=""/15, 0xf}, {&(0x7f00000008c0)=""/52, 0x34}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x6, &(0x7f0000001980)=""/97, 0x61}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f00000002c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000400)=[{&(0x7f0000000300)="dffe1f2f71bf2f5cf8b2d390cca168d9ab6d202cf18f1278aa13c637f60b8df69d10d2b4897d", 0x26, 0x3f}, {&(0x7f0000000340)="432ef3ce7940bec88b2139e0912fa8e01fba2b08a05458e0db62136545e9717e612d9e3fb8cbe07caac4d534f862d3df1c230cccbc76fb969270f71eff407c85e0597f0de0f97ce44f8d533ed375545de7d72c31e39b570cc407e9ba88254b197bff7e09c25ff579c4923e6fa40bb0f0babbc8f7703ffcfd276701bba50d0d83457f75aad636e11475081ccc2a37", 0x8e, 0x2}], 0xc0041, &(0x7f0000000440)={[{@huge_always}], [{@dont_appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor}, {@smackfshat={'smackfshat', 0x3d, 'system.posix_acl_default\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffffe0}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'system.posix_acl_default\x00'}}, {@euid_gt={'euid>', r2}}, {@obj_user={'obj_user', 0x3d, 'system.posix_acl_default\x00'}}]}) syz_mount_image$ext4(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x10000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:42 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') chroot(&(0x7f0000000040)='./file0\x00') 02:59:42 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') mount(&(0x7f0000000000)=@sr0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x20400, &(0x7f0000000140)='{&\xa4P\'\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x1f000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 368.435447][T12604] incfs_lookup_dentry err:-2 02:59:42 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x144) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 02:59:42 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x8c101c, &(0x7f0000000100)={[{@index_on}, {@xino_on}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_user={'subj_user', 0x3d, 'mountinfo\x00'}}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xff25, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 368.456427][T12609] overlayfs: unrecognized mount option "fowner>00000000000000016384" or missing value [ 368.476981][ T9404] incfs_lookup_dentry err:-2 [ 368.490017][T12613] loop1: p1 p2 p3 [ 368.493968][T12613] loop1: p1 start 10 is beyond EOD, truncated 02:59:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x20000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:42 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x28) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 368.519987][T12613] loop1: p2 size 1073872896 extends beyond EOD, truncated [ 368.554219][T12613] loop1: p3 start 225 is beyond EOD, truncated 02:59:42 executing program 4: syz_mount_image$erofs(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x3ff, 0x7, &(0x7f0000000400)=[{&(0x7f0000000180)="05f1725b05449eb9681df129ad14ab71b58010ab88a8a4ea7f", 0x19, 0xfffffffffffffff7}, {&(0x7f0000000240)="b6f6447610c01f84e598ec3161868446e18d7e2e4882a4ece4a3aab4b2be22eb46962cc1094d5feb2917165c6d83df051870cd56d42a3ee787fb5cafe2c406b69dc48bd2ead4bfb8b42258590cdca4e9cdc1cc29de41595d04ebedd65caad46e3e840b40cd9334948c2ff5f0611ba28e3e67fa047e929623fe0e2f618d43cd889493db1925161a340561fadd986e78e806e9b0b37f7b575a755079359080021251b952a87cbc50c2f37f9e2b09f7cc1feebfd4b782c8211cfd7f44cf0f1b", 0xbe, 0x9}, {&(0x7f0000000640)="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", 0x1000, 0x100000001}, {&(0x7f0000000300)="77c379e3f6a8e5b850191899d5099649d11e80fa296e51793a75b1ecadd9dd89bca0e1e03f2bdab5bd79a8e8e69df033c3584920774eeef3727fc2413302a29a148d2b4a0ef79e780ef040249bcf8020b7", 0x51, 0x8}, {&(0x7f0000001640)="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", 0x1000, 0x7f0b}, {&(0x7f0000000380)="b6001fae64939efe75733ca3ba680cf81ff326ea560563b11ab02c0c7219471d6898191814cd3216c6f4a32ca05cd7fe874bb9c881b29b9916a4df369f874b4cf3009f4ed2", 0x45, 0xfff}, {&(0x7f00000001c0)="b20fb789085cecdcfb27985da213bab9b669e54b5dff29b44d32b3b96d1fc05bd89deaec0e66651ca4ec", 0x2a, 0x7}], 0x0, &(0x7f00000004c0)={[{@nouser_xattr}, {@fault_injection={'fault_injection', 0x3d, 0xd7}}, {@fault_injection={'fault_injection', 0x3d, 0x1f}}, {@nouser_xattr}, {@noacl}, {@nouser_xattr}, {}, {@fault_injection={'fault_injection', 0x3d, 0xc955}}, {@nouser_xattr}, {}], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x66, 0x37, 0x38, 0x57, 0x66, 0x35, 0x66], 0x2d, [0x64, 0x33, 0x35, 0x38], 0x2d, [0x32, 0x37, 0x35, 0x32], 0x2d, [0x34, 0x4ed9f07b56665ea8, 0x32, 0x38], 0x2d, [0x66, 0x63, 0x32, 0x35, 0x32, 0x66, 0x63, 0x32]}}}, {@obj_user={'obj_user', 0x3d, 'oom_adj\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'oom_adj\x00'}}, {@dont_hash}, {@pcr={'pcr', 0x3d, 0x1f}}]}) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_adj\x00') sendfile(r0, r1, 0x0, 0x800000080004103) creat(&(0x7f0000000000)='./file0\x00', 0x8) [ 368.567936][ T147] loop1: p1 p2 p3 [ 368.577061][T12632] incfs_lookup_dentry err:-2 [ 368.578161][ T147] loop1: p1 start 10 is beyond EOD, truncated [ 368.594743][ T147] loop1: p2 size 1073872896 extends beyond EOD, truncated 02:59:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff4305400f0000060000003350b5"], 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/77, 0x4d) lgetxattr(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000, 0x8e846, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x100000f, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000500)=@v2={0x3, 0x1, 0xc, 0xce0, 0x49, "70930a524ba744af381a64e3b18bacd8f90edf3a71c167f655c9f1efd6b424e999d4765d993e5647abde268534091afd3ba43f9e19b4fa7a06c92fb7c043d5174e30ecd3b6eb125afa"}, 0x52, 0x2) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x7, 0x0, 0x0) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) 02:59:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:42 executing program 0: write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000280)={0xb, 0x77, 0x1, 0x5}, 0xb) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00') lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380), &(0x7f00000003c0)={'U-', 0x8}, 0x16, 0x3) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x95) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240), 0x101140, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000300)={0x0, 0x3f, 0x5}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x40000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:42 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='fuse\x00', 0x1000000, &(0x7f0000000140)='\x00') [ 368.619224][ T147] loop1: p3 start 225 is beyond EOD, truncated [ 368.639993][ T9404] incfs_lookup_dentry err:-2 02:59:42 executing program 4: mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f00000000c0)={0xffffffe0, 0x4, 0x4, 0x0, 0x7f, "abdd5136b5cfbb12de2b9eadf22deb27b73917", 0x40, 0x9}) 02:59:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x81000000, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 368.683323][T12649] incfs_lookup_dentry err:-2 02:59:42 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') dup(r0) sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x2, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 368.721136][ T22] audit: type=1400 audit(1622257182.821:27211): avc: denied { write } for pid=12648 comm="syz-executor.0" name="net" dev="proc" ino=130502 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 368.791847][ T9404] incfs_lookup_dentry err:-2 [ 368.809809][T12655] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.817379][T12655] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:42 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r6, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x585}]}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:43 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x2) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)) sendfile(r0, r1, 0x0, 0x800000080004103) [ 368.866649][ T22] audit: type=1400 audit(1622257182.821:27212): avc: denied { add_name } for pid=12648 comm="syz-executor.0" name="pfkey" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 02:59:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80020022}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)={0x44, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x44}}, 0x8900) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="08002cbd7000fbdbdf251100000008000300", @ANYRES32=0x0, @ANYBLOB="0c0006df69287f7dbd68e64c"], 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYRESDEC=r1], 0x4c}, 0x1, 0x0, 0x0, 0x4004050}, 0x40) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000a00)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000027bd7000000000001400000008001c00", @ANYRES32=0x0, @ANYBLOB="0c00060000000000000000000c0006e09d032700000000000c00060001000000010000000800030006a7b4ac2af5282c6de87edaecdf1d0261e2e3745e7ece88469d7b241080729d05d3c19b275e84570490c26efc36a423fcb6d78705a929b16470aa04385f38ea24d3ef096db5143c76f7b8a980c82ab4ef3b90ab9dcb46544f5560195177416458aa27", @ANYRES32=r4, @ANYBLOB="08001d00709aa5a5e741eaf30ad88b84b9600f94c70f2f30d81dfde09959fe0880dedae5932c9dc0020938b3be209bde5253408f87bd3aa82493b08ba3", @ANYRES32, @ANYBLOB], 0x50}}, 0x0) r5 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000440), 0xffffffffffffffff) syz_usb_disconnect(r5) ioctl$EVIOCRMFF(r5, 0x40044581, 0x0) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYRES16, @ANYRES16=r2, @ANYBLOB="20002bbd7000fcdbdf25100000000500110007000000050011002000000008000300", @ANYRES32=r4, @ANYBLOB="050011005600000008000300", @ANYRESDEC=r5, @ANYBLOB="0500100006000000050011000300000005001100ff0000000500110004000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x4000040) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000640), r0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, r6, 0x10, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008080}, 0x4) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000280)='./file1\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) ioctl$EVIOCSREP(r5, 0x40084503, &(0x7f0000000400)=[0x7, 0x7fff]) [ 368.899128][ T22] audit: type=1400 audit(1622257182.821:27213): avc: denied { create } for pid=12648 comm="syz-executor.0" name="pfkey" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:kernel_t:s0 tclass=file permissive=1 [ 368.939412][T12675] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 368.960085][T12675] EXT4-fs error (device loop0): __ext4_new_inode:930: comm syz-executor.0: reserved inode found cleared - inode=1 [ 368.964698][T12680] incfs_lookup_dentry err:-2 [ 368.977508][T12675] incfs: Can't find or create .index dir in ./file0 [ 368.981900][T12682] incfs_lookup_dentry err:-2 [ 368.992661][T12682] incfs_lookup_dentry err:-2 [ 369.002622][T12685] incfs: Can't find or create .index dir in ./file0 [ 369.041240][T12682] incfs_lookup_dentry err:-2 [ 369.061225][T12682] incfs_lookup_dentry err:-2 [ 369.066686][ T6471] BUG: Dentry ffff8881a661a660{i=0,n=.index} still in use (2) [unmount of ext4 loop0] [ 369.076508][ T6471] ------------[ cut here ]------------ [ 369.081980][ T6471] WARNING: CPU: 0 PID: 6471 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 369.090369][ T6471] Modules linked in: [ 369.094463][ T6471] CPU: 0 PID: 6471 Comm: syz-executor.0 Not tainted 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 369.104684][ T6471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.114761][ T6471] RIP: 0010:umount_check+0x179/0x1c0 [ 369.120037][ T6471] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 369.139637][ T6471] RSP: 0018:ffff8881a5acfc58 EFLAGS: 00010282 [ 369.145858][ T6471] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: bafb2a295dcc4a00 [ 369.154214][ T6471] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 369.162310][ T6471] RBP: ffff8881b190e420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 369.170365][ T6471] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 369.178424][ T6471] R13: 0000000000000002 R14: 0000000000000000 R15: ffff8881a661a660 02:59:43 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r6, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x585}]}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:43 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x80000, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x13}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0xffffffff}}, {@mode={'mode', 0x3d, 0x5}}], [{@fowner_lt}]}) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) link(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:43 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x68) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x81ffffff, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x3, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x9effffff, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xeaffffff, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xefffffff, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 369.186484][ T6471] FS: 0000000001c58400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 369.195410][ T6471] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 369.201988][ T6471] CR2: 0000000001c61b38 CR3: 00000001e9dff000 CR4: 00000000001406f0 [ 369.210139][ T6471] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 369.218110][ T6471] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 369.226075][ T6471] Call Trace: [ 369.229416][ T6471] d_walk+0x2d9/0x540 [ 369.233399][ T6471] ? __d_free+0x20/0x20 02:59:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xf0ffffff, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 369.237552][ T6471] shrink_dcache_for_umount+0x8a/0x1a0 [ 369.243008][ T6471] generic_shutdown_super+0x63/0x2a0 [ 369.248376][ T6471] kill_block_super+0x79/0xd0 [ 369.253053][ T6471] deactivate_locked_super+0xaf/0x100 [ 369.258423][ T6471] deactivate_super+0x1b3/0x270 [ 369.263361][ T6471] ? deactivate_locked_super+0x100/0x100 [ 369.269164][ T6471] ? dput+0x4de/0x5d0 [ 369.273146][ T6471] ? _raw_spin_lock_irqsave+0x210/0x210 [ 369.278693][ T6471] ? find_next_bit+0xc6/0x110 [ 369.283372][ T6471] cleanup_mnt+0x432/0x4e0 [ 369.287788][ T6471] task_work_run+0x186/0x1b0 02:59:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xfeffffff, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:43 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@rc={0x1f, @none}, &(0x7f0000000140)=0x80) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) symlinkat(&(0x7f00000001c0)='./file1\x00', r2, &(0x7f0000000280)='./file0\x00') sendfile(r0, r1, 0x0, 0x800000080004103) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r3, &(0x7f0000000180)=0x81, 0xff) creat(&(0x7f0000000000)='./file1\x00', 0x112) [ 369.292379][ T6471] prepare_exit_to_usermode+0x2b0/0x310 [ 369.297925][ T6471] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 369.303808][ T6471] RIP: 0033:0x467a37 [ 369.307696][ T6471] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 369.327391][ T6471] RSP: 002b:00007fffba226ff8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 369.335970][ T6471] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 369.344198][ T6471] RDX: 00007fffba2270cb RSI: 0000000000000002 RDI: 00007fffba2270c0 [ 369.352165][ T6471] RBP: 00007fffba2270c0 R08: 00000000ffffffff R09: 00007fffba226e90 [ 369.360132][ T6471] R10: 0000000001c59bd3 R11: 0000000000000246 R12: 00000000004bee70 [ 369.368099][ T6471] R13: 00007fffba228190 R14: 0000000001c59b00 R15: 00007fffba2281d0 [ 369.376150][ T6471] ---[ end trace ba3eda2bab56d96e ]--- [ 369.381838][ T6471] BUG: Dentry ffff8881a661a660{i=0,n=.index} still in use (2) [unmount of ext4 loop0] [ 369.391528][ T6471] ------------[ cut here ]------------ [ 369.396972][ T6471] WARNING: CPU: 0 PID: 6471 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 369.405346][ T6471] Modules linked in: [ 369.409216][ T6471] CPU: 0 PID: 6471 Comm: syz-executor.0 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 369.420721][ T6471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.430762][ T6471] RIP: 0010:umount_check+0x179/0x1c0 [ 369.436022][ T6471] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 369.455704][ T6471] RSP: 0018:ffff8881a5acfc58 EFLAGS: 00010282 [ 369.461753][ T6471] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: bafb2a295dcc4a00 [ 369.469708][ T6471] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 369.477666][ T6471] RBP: ffff8881b190e420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 369.485830][ T6471] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 369.493866][ T6471] R13: 0000000000000002 R14: 0000000000000000 R15: ffff8881a661a660 [ 369.501901][ T6471] FS: 0000000001c58400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 369.510891][ T6471] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 369.517560][ T6471] CR2: 0000000001c61b38 CR3: 00000001e9dff000 CR4: 00000000001406f0 [ 369.525618][ T6471] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 369.533651][ T6471] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 369.541603][ T6471] Call Trace: [ 369.544881][ T6471] d_walk+0x2d9/0x540 [ 369.548859][ T6471] ? __d_free+0x20/0x20 [ 369.552991][ T6471] shrink_dcache_for_umount+0x8a/0x1a0 [ 369.558428][ T6471] generic_shutdown_super+0x63/0x2a0 [ 369.563707][ T6471] kill_block_super+0x79/0xd0 [ 369.568361][ T6471] deactivate_locked_super+0xaf/0x100 [ 369.573707][ T6471] deactivate_super+0x1b3/0x270 [ 369.578538][ T6471] ? deactivate_locked_super+0x100/0x100 [ 369.584149][ T6471] ? dput+0x4de/0x5d0 [ 369.588105][ T6471] ? _raw_spin_lock_irqsave+0x210/0x210 [ 369.593625][ T6471] ? find_next_bit+0xc6/0x110 [ 369.598301][ T6471] cleanup_mnt+0x432/0x4e0 [ 369.602730][ T6471] task_work_run+0x186/0x1b0 [ 369.607297][ T6471] prepare_exit_to_usermode+0x2b0/0x310 [ 369.612825][ T6471] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 369.618777][ T6471] RIP: 0033:0x467a37 [ 369.622691][ T6471] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 369.642290][ T6471] RSP: 002b:00007fffba226ff8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 369.650689][ T6471] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 369.658662][ T6471] RDX: 00007fffba2270cb RSI: 0000000000000002 RDI: 00007fffba2270c0 [ 369.666632][ T6471] RBP: 00007fffba2270c0 R08: 00000000ffffffff R09: 00007fffba226e90 [ 369.674595][ T6471] R10: 0000000001c59bd3 R11: 0000000000000246 R12: 00000000004bee70 [ 369.682542][ T6471] R13: 00007fffba228190 R14: 0000000001c59b00 R15: 00007fffba2281d0 [ 369.690489][ T6471] ---[ end trace ba3eda2bab56d96f ]--- [ 369.716637][ T6471] VFS: Busy inodes after unmount of loop0. Self-destruct in 5 seconds. Have a nice day... 02:59:43 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) rmdir(&(0x7f0000000140)='\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) open(&(0x7f0000000280)='./file1/file0\x00', 0x640, 0x2) mknod(&(0x7f0000000000)='./file1\x00', 0x800, 0xb99) creat(&(0x7f0000000240)='./file1/file0\x00', 0xc0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) unlink(&(0x7f0000000100)='./file1\x00') 02:59:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xffffff7f, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x4, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:43 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r6, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x585}]}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:43 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2901000, &(0x7f0000000240)={[{@metacopy_off}, {@nfs_export_on}, {@index_off}, {@metacopy_off}, {@metacopy_on}, {@xino_auto}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@xino_auto}, {@nfs_export_off}], [{@dont_measure}, {@fowner_gt={'fowner>', r1}}]}) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:43 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004103) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x800000080004103) [ 369.800887][T12682] incfs_lookup_dentry err:-2 [ 369.805808][T12733] incfs_lookup_dentry err:-2 [ 369.811491][T12682] incfs_lookup_dentry err:-2 [ 369.816311][T12682] incfs_lookup_dentry err:-2 [ 369.828267][ T9404] incfs_lookup_dentry err:-2 02:59:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xffffff81, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 369.862609][T12739] incfs_lookup_dentry err:-2 02:59:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x5, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:44 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:44 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:44 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/prev\x00') ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x8000000) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r1) ioctl$EVIOCRMFF(r1, 0x40044581, 0x0) write(r1, &(0x7f0000000340)="7212a057b8ac2904858eff5e6846372d092c41803236bf64a6e81ef62ecc5e8d98576faf0d3fdb1392b830ea5e9abfcbcb738524a69dc640961bb05a568b9147a1bcd4228243745c98661753048784af1990a46ac18126274731b7f59608d5dd94176442ad809cbd09b548693e1cd41978dacc3249bf9cae15336e67443d67b5d9b4731a5e6efbc8297917d74357c6e3923a9dd49a6cbdf2674e2ea2d3187c2d4b03a4cb85b164c2349286bc7cf5d01fe066525e538710d7981dda3f9b27b187767c1c4a77aaaee848a802a03b688f081089", 0xd2) mkdir(&(0x7f0000000600)='./file0\x00', 0x20) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000), 0x46800, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x1d3) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004103) sendmsg$NFNL_MSG_COMPAT_GET(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0xb, 0x801, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_COMPAT_NAME={0x7, 0x1, '{\xf1\x00'}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x13, 0x1, 'incremental-fs\x00'}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x20040000}, 0x865) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 02:59:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x6, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 369.962338][ T9404] incfs_lookup_dentry err:-2 02:59:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xffffff9e, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x7, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 370.035772][T12763] incfs_lookup_dentry err:-2 02:59:44 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') [ 370.067156][T12773] incfs_lookup_dentry err:-2 [ 370.093843][T12773] incfs_lookup_dentry err:-2 [ 370.112678][T12773] incfs_lookup_dentry err:-2 [ 370.169923][ T420] device bridge_slave_1 left promiscuous mode [ 370.176098][ T420] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.195101][ T420] device bridge_slave_0 left promiscuous mode [ 370.207831][ T420] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.322931][T12773] incfs_lookup_dentry err:-2 [ 370.329833][T12773] incfs_lookup_dentry err:-2 [ 370.334492][T12773] incfs_lookup_dentry err:-2 [ 370.850352][T12773] incfs_lookup_dentry err:-2 [ 370.855139][T12773] incfs_lookup_dentry err:-2 [ 370.860207][T12781] incfs_lookup_dentry err:-2 [ 370.865485][T12786] incfs_lookup_dentry err:-2 [ 370.869828][T12773] incfs_lookup_dentry err:-2 [ 370.870724][T12786] incfs_lookup_dentry err:-2 [ 370.886390][ T9404] incfs_lookup_dentry err:-2 [ 371.433875][T12788] cgroup1: Unknown subsys name 'perf_event' [ 371.440421][T12788] cgroup1: Unknown subsys name 'net_cls' [ 371.476808][T12788] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.484028][T12788] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.491943][T12788] device bridge_slave_0 entered promiscuous mode [ 371.498809][T12788] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.506561][T12788] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.514082][T12788] device bridge_slave_1 entered promiscuous mode [ 371.550019][T12788] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.557046][T12788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.564341][T12788] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.571394][T12788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.591849][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 371.600190][ T2022] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.607393][ T2022] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.631105][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 371.639851][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 371.647998][ T2025] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.655069][ T2025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.663263][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.671875][ T2025] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.678889][ T2025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.686235][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 371.694304][ T2025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 371.703929][ T149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.717070][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 371.730330][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 371.738912][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:59:45 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r6, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x585}]}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xffffffea, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:45 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), 0x5024873, &(0x7f0000000100)=ANY=[@ANYBLOB="72656469724963745f6469723d2e2facd503d5839d5f056465783d6f6e2c78696e6f3d6f6e2c61707072616973655f747970653d696d617369672c00"]) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x8, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:45 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:45 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 371.780989][T12794] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 371.797718][T12794] EXT4-fs error (device loop1): __ext4_new_inode:930: comm syz-executor.1: reserved inode found cleared - inode=1 [ 371.810148][T12794] incfs: Can't find or create .index dir in ./file0 [ 371.850999][T12788] BUG: Dentry ffff8881e54efcc0{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 371.860816][T12788] ------------[ cut here ]------------ [ 371.866287][T12788] WARNING: CPU: 1 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 371.874771][T12788] Modules linked in: [ 371.878668][T12788] CPU: 1 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 371.890480][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.900540][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 371.905818][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 371.914052][T12804] incfs_lookup_dentry err:-2 [ 371.925495][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 371.925513][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 371.925517][T12788] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 371.925521][T12788] RBP: ffff8881dfaaf420 R08: ffffffff814e8437 R09: ffffed103ede5e08 [ 371.925524][T12788] R10: ffffed103ede5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 371.925528][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881e54efcc0 [ 371.925534][T12788] FS: 000000000307b400(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 371.925538][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 371.925549][T12788] CR2: 00007ffce5861a48 CR3: 00000001e6c9a000 CR4: 00000000001406e0 02:59:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xffffffef, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:46 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x1000, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004103) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000000)={0x8000, 0x7}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x7) sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:46 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 02:59:46 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xfffffff0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 371.966320][ T9404] incfs_lookup_dentry err:-2 [ 371.968033][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 371.988263][T12817] incfs_lookup_dentry err:-2 [ 371.991487][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 371.991490][T12788] Call Trace: [ 371.991504][T12788] d_walk+0x2d9/0x540 [ 371.991511][T12788] ? __d_free+0x20/0x20 [ 371.991519][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 371.991527][T12788] generic_shutdown_super+0x63/0x2a0 [ 371.991539][T12788] kill_block_super+0x79/0xd0 02:59:46 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/i2c_algo_bit', 0x40800, 0x80) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x10040, 0x62) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 372.051407][T12788] deactivate_locked_super+0xaf/0x100 [ 372.056780][T12788] deactivate_super+0x1b3/0x270 [ 372.061627][T12788] ? deactivate_locked_super+0x100/0x100 [ 372.067261][T12788] ? dput+0x4de/0x5d0 [ 372.071410][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 372.077155][T12788] ? find_next_bit+0xc6/0x110 [ 372.081822][T12788] cleanup_mnt+0x432/0x4e0 [ 372.086320][T12788] task_work_run+0x186/0x1b0 [ 372.090904][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 372.096467][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 372.102445][T12788] RIP: 0033:0x467a37 [ 372.106311][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 372.125885][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 372.134267][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 372.142462][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 372.150475][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 372.158421][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 372.166366][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 372.174336][T12788] ---[ end trace ba3eda2bab56d970 ]--- [ 372.181721][T12788] BUG: Dentry ffff8881e54efcc0{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 372.191597][T12788] ------------[ cut here ]------------ [ 372.197041][T12788] WARNING: CPU: 1 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 372.205517][T12788] Modules linked in: [ 372.209428][T12788] CPU: 1 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 372.221135][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.232250][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 372.237514][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 372.257302][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 372.263340][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 372.271295][T12788] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 372.279337][T12788] RBP: ffff8881dfaaf420 R08: ffffffff814e8437 R09: ffffed103ede5e08 [ 372.287477][T12788] R10: ffffed103ede5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 372.295433][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881e54efcc0 [ 372.303377][T12788] FS: 000000000307b400(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 372.312359][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 372.318929][T12788] CR2: 00007ffce5861a48 CR3: 00000001e6c9a000 CR4: 00000000001406e0 [ 372.326875][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 372.334821][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 372.342850][T12788] Call Trace: [ 372.346118][T12788] d_walk+0x2d9/0x540 [ 372.350074][T12788] ? __d_free+0x20/0x20 [ 372.354218][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 372.359662][T12788] generic_shutdown_super+0x63/0x2a0 [ 372.364917][T12788] kill_block_super+0x79/0xd0 [ 372.369571][T12788] deactivate_locked_super+0xaf/0x100 [ 372.374929][T12788] deactivate_super+0x1b3/0x270 [ 372.379751][T12788] ? deactivate_locked_super+0x100/0x100 [ 372.385349][T12788] ? dput+0x4de/0x5d0 [ 372.389299][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 372.394811][T12788] ? find_next_bit+0xc6/0x110 [ 372.399460][T12788] cleanup_mnt+0x432/0x4e0 [ 372.403865][T12788] task_work_run+0x186/0x1b0 [ 372.408451][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 372.414086][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 372.419961][T12788] RIP: 0033:0x467a37 [ 372.423983][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 372.443662][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 372.452160][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 372.460129][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 372.468071][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 372.476022][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 372.483963][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 372.491917][T12788] ---[ end trace ba3eda2bab56d971 ]--- [ 372.515881][ T9404] incfs_lookup_dentry err:-2 [ 372.521926][T12788] VFS: Busy inodes after unmount of loop1. Self-destruct in 5 seconds. Have a nice day... [ 372.545164][T12830] incfs_lookup_dentry err:-2 [ 372.550585][T12834] incfs_lookup_dentry err:-2 [ 372.565339][T12834] incfs_lookup_dentry err:-2 02:59:46 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r6, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x585}]}) 02:59:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x9, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0xfffffffe, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:46 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004103) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, r5, 0x70d, 0x0, 0x0, {{0x5}, {@val={0xc}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001180)={0x20ac, r5, 0x400, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x29}}}}, [@NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x20}, @NL80211_ATTR_VENDOR_DATA={0x4a, 0xc5, "051fd3e58efa9663712228362e9b02ff6516002d9744c07afbf0399fc974517ce6874e078af2428b2fb86e70e40b9102a1339771bb33c0734f97592f082aa995880d387ca196"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x5}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x886c}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x5}, @NL80211_ATTR_VENDOR_DATA={0x1004, 0xc5, "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"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0xe4b}, @NL80211_ATTR_VENDOR_DATA={0x1004, 0xc5, "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"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x5}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x4}]}, 0x20ac}}, 0x4000000) sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:46 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)) 02:59:46 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x7494c2, 0x100) [ 372.598128][ T9404] incfs_lookup_dentry err:-2 [ 372.608575][T12840] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 372.625310][T12840] EXT4-fs error (device loop1): __ext4_new_inode:930: comm syz-executor.1: reserved inode found cleared - inode=1 [ 372.637883][T12840] incfs: Can't find or create .index dir in ./file0 [ 372.675061][T12788] BUG: Dentry ffff8881a6711000{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 372.685031][T12788] ------------[ cut here ]------------ [ 372.687086][T12850] incfs_lookup_dentry err:-2 [ 372.690488][T12788] WARNING: CPU: 0 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 372.690490][T12788] Modules linked in: [ 372.690502][T12788] CPU: 0 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 372.690505][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.690513][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 372.690525][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 372.754367][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 372.760429][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 02:59:46 executing program 0: mkdir(&(0x7f0000000000)='./file1\x00', 0x4) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x5, 0x0, 0x0, 0x800000, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x100, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xa, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 372.768483][T12788] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 372.770516][T12858] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 372.776720][T12788] RBP: ffff8881ef0e5420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 372.776725][T12788] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 372.776729][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881a6711000 [ 372.776736][T12788] FS: 000000000307b400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 372.776747][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 02:59:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xb, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x2, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 372.822663][T12858] __nla_validate_parse: 4 callbacks suppressed [ 372.822669][T12858] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 372.824229][T12788] CR2: 00007ffe3d3f9458 CR3: 00000001e6c9a000 CR4: 00000000001406f0 [ 372.824238][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 372.824242][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 372.824251][T12788] Call Trace: [ 372.867087][T12788] d_walk+0x2d9/0x540 [ 372.871139][T12788] ? __d_free+0x20/0x20 02:59:46 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000003180)={0x8, {"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", 0x1000}}, 0x1006) recvmsg(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@x25, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)=""/19, 0x13}, {&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000240)=""/207, 0xcf}, {&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/175, 0xaf}, {&(0x7f0000000480)=""/197, 0xc5}, {&(0x7f0000002180)=""/4096, 0x1000}], 0x8, &(0x7f0000000640)=""/57, 0x39}, 0x40000000) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 372.875294][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 372.880748][T12788] generic_shutdown_super+0x63/0x2a0 [ 372.886028][T12788] kill_block_super+0x79/0xd0 [ 372.890704][T12788] deactivate_locked_super+0xaf/0x100 [ 372.896073][T12788] deactivate_super+0x1b3/0x270 [ 372.900922][T12788] ? deactivate_locked_super+0x100/0x100 [ 372.906551][T12788] ? dput+0x4de/0x5d0 [ 372.910534][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 372.916088][T12788] ? find_next_bit+0xc6/0x110 [ 372.920759][T12788] cleanup_mnt+0x432/0x4e0 [ 372.925173][T12788] task_work_run+0x186/0x1b0 [ 372.929858][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 372.935405][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 372.941289][T12788] RIP: 0033:0x467a37 [ 372.945176][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 372.965009][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 372.973574][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 372.981578][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 372.989541][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 372.997502][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 373.005543][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 373.013490][T12788] ---[ end trace ba3eda2bab56d972 ]--- [ 373.021373][T12788] BUG: Dentry ffff8881a6711000{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 373.031254][T12788] ------------[ cut here ]------------ [ 373.036698][T12788] WARNING: CPU: 0 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 373.045171][T12788] Modules linked in: [ 373.049048][T12788] CPU: 0 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 373.060636][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.070858][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 373.076205][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 373.095782][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 373.101817][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 373.109760][T12788] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 373.117701][T12788] RBP: ffff8881ef0e5420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 373.125826][T12788] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 373.133768][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881a6711000 [ 373.141896][T12788] FS: 000000000307b400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 373.150967][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 373.157519][T12788] CR2: 00007ffe3d3f9458 CR3: 00000001e6c9a000 CR4: 00000000001406f0 [ 373.165558][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 373.173514][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 373.181467][T12788] Call Trace: [ 373.184831][T12788] d_walk+0x2d9/0x540 [ 373.188781][T12788] ? __d_free+0x20/0x20 [ 373.192906][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 373.198336][T12788] generic_shutdown_super+0x63/0x2a0 [ 373.203700][T12788] kill_block_super+0x79/0xd0 [ 373.208350][T12788] deactivate_locked_super+0xaf/0x100 [ 373.213699][T12788] deactivate_super+0x1b3/0x270 [ 373.218519][T12788] ? deactivate_locked_super+0x100/0x100 [ 373.224218][T12788] ? dput+0x4de/0x5d0 [ 373.228166][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 373.233853][T12788] ? find_next_bit+0xc6/0x110 [ 373.238510][T12788] cleanup_mnt+0x432/0x4e0 [ 373.242896][T12788] task_work_run+0x186/0x1b0 [ 373.247674][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 373.253192][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 373.259055][T12788] RIP: 0033:0x467a37 [ 373.262918][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 373.282498][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 373.290904][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 373.298852][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 373.306796][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 373.314747][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 373.322709][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 373.330832][T12788] ---[ end trace ba3eda2bab56d973 ]--- [ 373.352507][ T9404] incfs_lookup_dentry err:-2 [ 373.391009][T12788] VFS: Busy inodes after unmount of loop1. Self-destruct in 5 seconds. Have a nice day... [ 373.481019][T12890] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 373.497068][T12890] EXT4-fs error (device loop1): __ext4_new_inode:930: comm syz-executor.1: reserved inode found cleared - inode=1 [ 373.510274][T12890] incfs: Can't find or create .index dir in ./file0 02:59:47 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) 02:59:47 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa36e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000240)=0x76, 0x4) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000001380)=[{&(0x7f0000000000)="d2", 0x1}], 0x1) recvmmsg(r0, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0x6}], 0x40001, &(0x7f00000004c0)={[{@shortname_mixed}]}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000300)=0x3f) r1 = socket$inet(0x2, 0x0, 0x0) recvmmsg(r1, &(0x7f00000047c0)=[{{&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000480)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/95, 0x5f}, {&(0x7f0000000500)=""/236, 0xec}, {&(0x7f0000000640)=""/193, 0xc1}], 0x4, &(0x7f0000000740)=""/26, 0x1a}, 0x9}, {{&(0x7f0000000780)=@qipcrtr, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000800)=""/226, 0xe2}, {&(0x7f0000000900)=""/247, 0xf7}, {&(0x7f0000000a00)=""/229, 0xe5}, {&(0x7f0000000b00)=""/113, 0x71}, {&(0x7f0000000b80)=""/211, 0xd3}, {&(0x7f0000000c80)=""/64, 0x40}, {&(0x7f0000000cc0)=""/95, 0x5f}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000d40)=""/124, 0x7c}, {&(0x7f0000000dc0)=""/20, 0x14}], 0xa, &(0x7f00000033c0)=""/4096, 0x1000}, 0xdcd6}, {{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000ec0)=""/19, 0x13}, {&(0x7f0000000f00)=""/45, 0x2d}, {&(0x7f0000000f40)=""/85, 0x55}, {&(0x7f0000000fc0)=""/150, 0x96}, {&(0x7f0000001080)=""/193, 0xc1}], 0x5, &(0x7f0000001200)}, 0x1}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000004700)=[{&(0x7f00000043c0)=""/207, 0xcf}, {&(0x7f00000012c0)=""/178, 0xb2}, {&(0x7f00000044c0)=""/42, 0x2a}, {&(0x7f0000004500)=""/172, 0xac}, {&(0x7f00000045c0)=""/9, 0x9}, {&(0x7f0000004600)=""/209, 0xd1}], 0x6, &(0x7f0000004780)=""/27, 0x1b}, 0x81}], 0x4, 0x0, &(0x7f00000048c0)) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x5, &(0x7f00000002c0)=0x6, 0x4) creat(&(0x7f0000000000)='./file0\x00', 0x1) umount2(&(0x7f0000000040)='./file0\x00', 0x4) mkdir(&(0x7f0000000280)='./file0\x00', 0x2a) 02:59:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xc, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x3, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:47 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x8) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) mount$overlay(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000, &(0x7f0000000300)=ANY=[]) creat(&(0x7f0000000380)='./file0/file0\x00', 0x4c) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x44) mount(&(0x7f0000000000)=@filename='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='btrfs\x00', 0x2041804, 0x0) open(&(0x7f0000000140)='./file0/file0\x00', 0x4100, 0x8c) 02:59:47 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='%&,@)}^#\xa8\x00', &(0x7f0000000100)='-(@()+}-#.)&:{$\x00', &(0x7f0000000140)='incremental-fs\x00'], &(0x7f00000003c0)=[&(0x7f00000001c0)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='mountinfo\x00', &(0x7f00000002c0)='(#\x00', &(0x7f0000000300)='^\x00', &(0x7f0000000340)='\'\\*)\x00', &(0x7f0000000380)='incremental-fs\x00']) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 373.530560][T12788] BUG: Dentry ffff8881dcb8ccc0{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 373.540327][T12788] ------------[ cut here ]------------ [ 373.545792][T12788] WARNING: CPU: 0 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 373.554207][T12901] incfs_lookup_dentry err:-2 [ 373.554272][T12788] Modules linked in: [ 373.562725][T12788] CPU: 0 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 373.574324][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.584369][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 373.589637][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 373.609308][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 373.615347][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 373.623288][T12788] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 373.631232][T12788] RBP: ffff8881ef57b420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 373.639175][T12788] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 373.647117][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881dcb8ccc0 [ 373.655062][T12788] FS: 000000000307b400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 373.663960][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 373.670614][T12788] CR2: 0000000003084b38 CR3: 00000001e6c9a000 CR4: 00000000001406f0 [ 373.678559][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 373.686863][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 373.694814][T12788] Call Trace: [ 373.698370][T12788] d_walk+0x2d9/0x540 [ 373.702326][T12788] ? __d_free+0x20/0x20 [ 373.706456][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 373.711885][T12788] generic_shutdown_super+0x63/0x2a0 [ 373.717141][T12788] kill_block_super+0x79/0xd0 [ 373.721790][T12788] deactivate_locked_super+0xaf/0x100 [ 373.727147][T12788] deactivate_super+0x1b3/0x270 [ 373.731999][T12788] ? deactivate_locked_super+0x100/0x100 [ 373.737604][T12788] ? dput+0x4de/0x5d0 [ 373.741558][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 373.747073][T12788] ? find_next_bit+0xc6/0x110 [ 373.751810][T12788] cleanup_mnt+0x432/0x4e0 [ 373.756209][T12788] task_work_run+0x186/0x1b0 [ 373.760947][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 373.766471][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 373.772335][T12788] RIP: 0033:0x467a37 [ 373.776225][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 373.795897][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 373.804284][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 373.812226][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 373.820343][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 373.828301][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 373.836240][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 373.844283][T12788] ---[ end trace ba3eda2bab56d974 ]--- 02:59:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x4, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xd, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 373.874268][T12902] incfs_lookup_dentry err:-2 02:59:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x6, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 373.915768][T12788] VFS: Busy inodes after unmount of loop1. Self-destruct in 5 seconds. Have a nice day... [ 373.979109][T12921] incfs_lookup_dentry err:-2 02:59:48 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x22) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xe, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:48 executing program 4: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x138, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x10, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'nr0\x00'}}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4e1d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffff92}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}]}, @TIPC_NLA_SOCK={0x94, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfff}]}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1b3}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x86ea}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8114}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x20000000}, 0x40002) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000000c0)={0x3, '\x00', {0x7}, 0x4}) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x40, r1, 0x100, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0xfa}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x1}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x8, 0x7f}}, @NL80211_ATTR_BSSID={0xa}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0xf, 0x3f}}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4000001) lsetxattr$security_selinux(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:mqueue_spool_t:s0\x00', 0x24, 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004103) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000500)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="ee05f3a24056b2b814ee192a2e20aabbcf401c776b0fed819106559415b260de09a6fbf14486d132e2c630ecc61bc9a27302fe34496a64265ec2f8a5c3b584bc2230ea0e8d362f59ce1b5e3c46e0ddfed82c50ebf131a2a01b0944f4ca0d5c6e83b7ea640673fae6d4f08ca6793c0c83be3595865a3f372866d2558d6403f8ba645f72c66ad0737637d47341fa228798bb3d832fe89ac7048a0528b53ecb43831e16d15f9c2e28fdf104328938cf8e", @ANYRES16=r0, @ANYBLOB="89362cbd7000ffdbdf250b000000440001800c000280080004004e00000008000300000000002c0004001400010002004e21ac1414aa00000000000000001400020002004e217f0000010000000000000000300004802c000780080003000900000008000400f80d00000800040004000000080002000104000008000300020000007c0002801400038008000100000000000800010002000000340003800800010006000000080002009f06000008000200000800000800010000040000080002000101000008000100080000001400038008000200ff030000080002000000000008000100cd00000008000200090000000400040008000100080000003c01068008000100030000000400020020000300a3a786f36954c9beecfdb16024ac8af0204faad167d4af48beb6bea60001030012f927cb941d5a15e08a039dca53d57ab5d7ac13201d4a8b4f86bad5206a1cbe8fd94f467230bad00f1744ae6fa15989b98652ed4b6fad55328e3ab90c647018a03059e4424e3f91caf5f3a37b58c1a8f7fff9614b054da0c64323216329d1902398e43cf5a5c2db804d37d5d5ba47787b721d9bcaf9cd4fbc788e67f6c58d99726407035dcfed90db0705abeff411d60372441c06c1c619755cc4fbc9c0ccd70b200ad3dfae32d5341a614734584661477c4ea690b6641284accfe2db1a096fd0e9bdb91ed50a13141348857f30eb929ee8244797947d0500bcbfe21798b32dd88927b1d5195b1206ed388de0c055e1d94e201f58b9edbd005d4abd0400020006000300e5cb0000"], 0x240}, 0x1, 0x0, 0x0, 0x40000}, 0x40005) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000c40)=0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r6, 0x0) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x70d, 0x0, 0x0, {{0x5}, {@val={0xc}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(r3, &(0x7f0000000f40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000f00)={&(0x7f0000000d40)={0x19c, 0x0, 0x2fae51abb50c62ae, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5, 0x2b}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_IE={0x146, 0x2a, [@cf={0x4, 0x6, {0x80, 0x4, 0x0, 0xed}}, @ext_channel_switch={0x3c, 0x4, {0x0, 0x81, 0xb6, 0x18}}, @perr={0x84, 0x116, {0x1f, 0x12, [@not_ext={{}, @broadcast, 0xe9, "", 0x2}, @ext={{}, @device_a, 0x1000, @broadcast, 0x23}, @not_ext={{}, @device_b, 0x2, "", 0xf}, @not_ext={{}, @device_b, 0x1, "", 0x1b}, @not_ext={{}, @device_a, 0xff, "", 0x16}, @ext={{}, @device_a, 0x8, @device_a, 0x23}, @not_ext={{}, @device_a, 0x8, "", 0x4}, @not_ext={{}, @device_a, 0xf716, "", 0x1d}, @not_ext={{}, @device_a, 0x3, "", 0xd}, @not_ext={{}, @broadcast, 0x80000000, "", 0x13}, @not_ext={{}, @device_a, 0x2, "", 0x1}, @ext={{}, @device_a, 0x3, @device_b, 0x2e}, @not_ext={{}, @broadcast, 0x3120}, @ext={{}, @device_a, 0xff, @device_a, 0xf}, @ext={{}, @device_a, 0x3, @broadcast, 0x2000}, @ext={{}, @broadcast, 0x2, @broadcast, 0x1f}, @ext={{}, @device_b, 0x4, @device_a, 0x24}, @not_ext={{}, @broadcast, 0x2, "", 0x3}]}}, @ht={0x2d, 0x1a, {0x400, 0x2, 0x0, 0x0, {0x4d64, 0x3f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, 0x6, 0xfff, 0x3}}]}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}]}, 0x19c}, 0x1, 0x0, 0x0, 0x40}, 0x10) syz_mount_image$msdos(&(0x7f00000006c0), &(0x7f0000000700)='./file0/file0\x00', 0x2, 0x4, &(0x7f0000000880)=[{&(0x7f0000000740)="06c9ec99678cae49521346926bb13e49d0a01b69071997d8d77c8b8452fee8a62deef36cc8f16c07558a52ef4ece6f7b636a49aa77b33e3e8e5a8257f98cac9690c457dd33d5499f233151c7384cea7f03e693", 0x53, 0xfff}, {&(0x7f00000007c0)="810cc5f35c53a9364f6ce3018f605fd9e75d59ef37eba4f62a220a6300efa957af5dc362978c12187a8be3db779ccfe02276ab634d11b45c7fa286", 0x3b, 0x217d97f0}, {&(0x7f0000000800)="60942c304a23b329aab3943659a3697a53e5ac6d7e74e8aaca03e93ba0afb091372b2bb7c7e0be6bdbdc5c", 0x2b, 0x2}, {&(0x7f0000000840)="56078a95a696c6b726d4a450f8eff2b03def66bb7befa4082a494205ef3236", 0x1f, 0x3}], 0x400, &(0x7f0000000c80)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x8001}}, {@dots}], [{@audit}, {@uid_eq={'uid', 0x3d, r4}}, {@obj_user={'obj_user', 0x3d, 'incremental-fs\x00'}}, {@subj_user={'subj_user', 0x3d, '\xf4'}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@euid_eq={'euid', 0x3d, r6}}, {@seclabel}]}) [ 374.023687][ T9404] incfs_lookup_dentry err:-2 [ 374.045231][T12928] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 374.072355][T12928] EXT4-fs error (device loop1): __ext4_new_inode:930: comm syz-executor.1: reserved inode found cleared - inode=1 [ 374.091656][T12935] incfs_lookup_dentry err:-2 [ 374.115820][T12928] incfs: Can't find or create .index dir in ./file0 [ 374.131036][ T9404] incfs_lookup_dentry err:-2 02:59:48 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 02:59:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x9, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x10, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:48 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x344848, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:48 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "4d4768729d86656d6b42327b1e016c1af68d42825e7abece8006f7755cc7a9a8a55b51c2776cfc64a7b672741fce6292c6ba8a6bb91762bbedd707f8efbd6a02", 0x15}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r0, 0xc3, 0xbe}, &(0x7f0000000240)={'enc=', 'raw', ' hash=', {'sha512-ssse3\x00'}}, &(0x7f00000002c0)="f04c19f16786bbe8cf3f385d770432db9c5d7c6b18f0dc27df5c07accaabbdaacf6f20dc07f7f547f85c4f674d1716580ed10f47359606ad7c9701579e9b8b61708da2aef67b02812e32c23a78c770ce5d614d8d25ad89449d88de2f323a35825bce38a5fb29162103d82d931b0c60cc7eb4af9aa45ff2cc30945d95262690c1bf91666d74c689db2f9b82d944cbabb652e3f1bb360fcf16c37524514257b5a5d3d584ce6315a0bc7f0369b6d2e988bfae54f5812d1abde72472c34d4a3afcd72aefdc", &(0x7f00000003c0)="cadde8faba78838a049a17272dd6eaa3ff3dccf64abd80582132c7d3f93badae1ceeeda430424d4c981daf7803adb6158ab8122bd168f1f53f89cfd2be67f572d9af6fbb5d372daace9fa5aadcebeffcc3454acd6767463134dd4c2215e5065880ce66476f90eceec23729d572e9c9f0455c8a95250f49511e209102499d4c6486fda25cc774016ace10539a17272b95de6eaafee26b1a6af489d081869dd5784fe0549e6bea1404ce7eed4f230ca606776790cb0358f34329330706b6fc") mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) [ 374.156332][T12788] BUG: Dentry ffff8881ecea2dd0{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 374.166180][T12788] ------------[ cut here ]------------ [ 374.171648][T12788] WARNING: CPU: 0 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 374.180128][T12788] Modules linked in: [ 374.182919][T12948] incfs_lookup_dentry err:-2 [ 374.184017][T12788] CPU: 0 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 02:59:48 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@md0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='nilfs2\x00', 0x2000002, &(0x7f0000000140)='*!$+*(\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 374.184021][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.184034][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 374.184046][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 374.230733][ T9404] incfs_lookup_dentry err:-2 [ 374.235345][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 374.246005][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 374.253971][T12788] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 374.262135][T12788] RBP: ffff8881e329e420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 374.270100][T12788] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 374.277675][T12952] incfs_lookup_dentry err:-2 [ 374.278076][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881ecea2dd0 [ 374.278084][T12788] FS: 000000000307b400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 374.278089][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 02:59:48 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040), 0x101060, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x250000, 0x40) [ 374.278099][T12788] CR2: 0000000003084b38 CR3: 00000001e6c9a000 CR4: 00000000001406f0 [ 374.314072][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 374.322077][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 374.330038][T12788] Call Trace: [ 374.333323][T12788] d_walk+0x2d9/0x540 [ 374.337298][T12788] ? __d_free+0x20/0x20 [ 374.341541][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 374.346994][T12788] generic_shutdown_super+0x63/0x2a0 [ 374.352365][T12788] kill_block_super+0x79/0xd0 02:59:48 executing program 4: futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x2105400, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='xprtrdma_frwr_sgerr\x00', r1}, 0x10) ioctl$int_out(r2, 0x0, &(0x7f0000000100)) [ 374.357132][T12788] deactivate_locked_super+0xaf/0x100 [ 374.362587][T12788] deactivate_super+0x1b3/0x270 [ 374.367468][T12788] ? deactivate_locked_super+0x100/0x100 [ 374.373095][T12788] ? dput+0x4de/0x5d0 [ 374.377071][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 374.382610][T12788] ? find_next_bit+0xc6/0x110 [ 374.387278][T12788] cleanup_mnt+0x432/0x4e0 [ 374.391695][T12788] task_work_run+0x186/0x1b0 [ 374.396367][T12788] prepare_exit_to_usermode+0x2b0/0x310 02:59:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x10, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 374.401904][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 374.407794][T12788] RIP: 0033:0x467a37 [ 374.411674][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 374.431279][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 374.439679][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 374.447649][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 02:59:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x11, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 374.455609][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 374.463576][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 374.471636][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 374.479696][T12788] ---[ end trace ba3eda2bab56d975 ]--- [ 374.496420][T12788] BUG: Dentry ffff8881ecea2dd0{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 374.506139][T12788] ------------[ cut here ]------------ [ 374.511602][T12788] WARNING: CPU: 0 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 374.520081][T12788] Modules linked in: [ 374.523978][T12788] CPU: 0 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 374.535668][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.545724][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 374.550981][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 374.570880][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 374.576920][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 374.584862][T12788] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 374.592805][T12788] RBP: ffff8881e329e420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 374.600873][T12788] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 374.608817][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881ecea2dd0 [ 374.616760][T12788] FS: 000000000307b400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 374.625659][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 374.632228][T12788] CR2: 000056236c89cb40 CR3: 00000001e6c9a000 CR4: 00000000001406f0 [ 374.640177][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 374.648210][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 374.656178][T12788] Call Trace: [ 374.659532][T12788] d_walk+0x2d9/0x540 [ 374.663485][T12788] ? __d_free+0x20/0x20 [ 374.667635][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 374.673064][T12788] generic_shutdown_super+0x63/0x2a0 [ 374.678318][T12788] kill_block_super+0x79/0xd0 [ 374.682971][T12788] deactivate_locked_super+0xaf/0x100 [ 374.688376][T12788] deactivate_super+0x1b3/0x270 [ 374.693197][T12788] ? deactivate_locked_super+0x100/0x100 [ 374.698813][T12788] ? dput+0x4de/0x5d0 [ 374.702769][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 374.708286][T12788] ? find_next_bit+0xc6/0x110 [ 374.713038][T12788] cleanup_mnt+0x432/0x4e0 [ 374.717431][T12788] task_work_run+0x186/0x1b0 [ 374.722062][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 374.727898][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 374.733868][T12788] RIP: 0033:0x467a37 [ 374.737984][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 374.757741][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 374.766279][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 374.774293][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 374.782235][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 374.790374][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 374.798425][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 02:59:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x2, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 374.806469][T12788] ---[ end trace ba3eda2bab56d976 ]--- [ 374.816144][ T9404] incfs_lookup_dentry err:-2 [ 374.861887][T12971] incfs_lookup_dentry err:-2 [ 374.897933][ T9404] incfs_lookup_dentry err:-2 [ 374.937483][T12788] VFS: Busy inodes after unmount of loop1. Self-destruct in 5 seconds. Have a nice day... [ 375.009017][T12985] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 375.024444][T12985] EXT4-fs error (device loop1): __ext4_new_inode:930: comm syz-executor.1: reserved inode found cleared - inode=1 [ 375.037564][T12985] incfs: Can't find or create .index dir in ./file0 02:59:49 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) 02:59:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x12, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:49 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) prctl$PR_MCE_KILL(0x26, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) 02:59:49 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2000, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) openat(r1, &(0x7f0000000140)='./file0/file0\x00', 0x40000, 0x94) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x2304410, &(0x7f0000000240)={[{@metacopy_on}, {@upperdir={'upperdir', 0x3d, './file0/file0'}}, {@index_off}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_on}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on}]}) 02:59:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x3, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:49 executing program 0: getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000005c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000640)=0x10) r0 = syz_open_dev$vcsu(&(0x7f0000000680), 0x400, 0x6000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f00000006c0)=""/4096, &(0x7f00000016c0)=0x1000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x40}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x51) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000240)='.log\x00', 0x10000, 0x4) r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000340)={0x1, 0x100000001, 0x8}) ioctl$KVM_S390_INTERRUPT_CPU(r3, 0x4010ae94, &(0x7f0000000040)={0x700, 0x0, 0x40000000007}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="f5df0000000000000000260000001cc57114feb4db9dcb858096a07f7402eb18a7bab704ab843fb191b6bce53a875a982e3fa286cbfb3e94723460226cd2b43d97056bac36e6684a854932815598ec9c4b70203484b023d7bc0f7de98f41c491ef1b85b8ea7c2daca90eff6ab56db67d7737f81f9ab779ff17e0aee27f2464a911a3ed06fc5a117277899dc68e9c9aa5593543f1c86055f5d7d7ac7282ec9907a0ae39a0ea9b5bcf40c51571a7f4672e7a2c83637488d60faec9f0c442491a917d40cf259953f55ea2d1f098b7a60c94"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x50, r5, 0x70c, 0x70bd2a, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0x50}, 0x1, 0x0, 0x0, 0x40084}, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x170, r5, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x81}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x324f}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x4c6a}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x20}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x800}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3ee}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xf84}}]}, 0x170}, 0x1, 0x0, 0x0, 0x20044004}, 0x77b81dcf47a32b1d) [ 375.054888][T12788] BUG: Dentry ffff8881e541c550{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 375.064688][T12788] ------------[ cut here ]------------ [ 375.070166][T12788] WARNING: CPU: 1 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 375.070169][T12788] Modules linked in: [ 375.070181][T12788] CPU: 1 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 375.070185][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.070195][T12788] RIP: 0010:umount_check+0x179/0x1c0 02:59:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x4080, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) preadv(r2, &(0x7f0000000500)=[{&(0x7f0000001180)=""/4096, 0x1000}, {}, {&(0x7f00000000c0)=""/2, 0x2}, {&(0x7f0000000100)=""/105, 0x69}, {&(0x7f0000000240)=""/208, 0xd0}, {&(0x7f0000000180)=""/61, 0x3d}, {&(0x7f0000000340)=""/235, 0xeb}, {&(0x7f0000000440)=""/166, 0xa6}, {&(0x7f00000001c0)=""/57, 0x39}], 0x9, 0x5, 0x4) [ 375.070202][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 375.070206][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 375.070213][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 375.070218][T12788] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 375.070223][T12788] RBP: ffff8881ac509420 R08: ffffffff814e8437 R09: ffffed103ede5e08 [ 375.070227][T12788] R10: ffffed103ede5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 375.070231][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881e541c550 [ 375.070238][T12788] FS: 000000000307b400(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 375.070243][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 375.070247][T12788] CR2: 0000000003084b38 CR3: 00000001e6c9a000 CR4: 00000000001406e0 [ 375.070255][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 02:59:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x25, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 375.070259][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 375.070267][T12788] Call Trace: [ 375.127617][T12999] incfs_lookup_dentry err:-2 [ 375.129184][T12788] d_walk+0x2d9/0x540 [ 375.129198][T12788] ? __d_free+0x20/0x20 [ 375.148375][T13000] incfs_lookup_dentry err:-2 [ 375.151190][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 375.151200][T12788] generic_shutdown_super+0x63/0x2a0 [ 375.151214][T12788] kill_block_super+0x79/0xd0 [ 375.160004][T13000] incfs_lookup_dentry err:-2 [ 375.167213][T12788] deactivate_locked_super+0xaf/0x100 [ 375.167220][T12788] deactivate_super+0x1b3/0x270 [ 375.167233][T12788] ? deactivate_locked_super+0x100/0x100 [ 375.177054][T13000] incfs_lookup_dentry err:-2 [ 375.184271][T12788] ? dput+0x4de/0x5d0 [ 375.184279][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 375.184287][T12788] ? find_next_bit+0xc6/0x110 [ 375.184295][T12788] cleanup_mnt+0x432/0x4e0 [ 375.184305][T12788] task_work_run+0x186/0x1b0 [ 375.184320][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 375.195425][T13000] incfs_lookup_dentry err:-2 [ 375.198856][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 375.198868][T12788] RIP: 0033:0x467a37 [ 375.207849][T13001] incfs_lookup_dentry err:-2 [ 375.215042][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 375.215047][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 375.215054][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 375.215058][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 375.215062][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 375.215066][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 375.215076][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 375.218492][T13001] incfs_lookup_dentry err:-2 [ 375.222907][T12788] ---[ end trace ba3eda2bab56d977 ]--- 02:59:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x48, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 375.239145][T12788] BUG: Dentry ffff8881e541c550{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 375.413048][T12788] ------------[ cut here ]------------ [ 375.413062][T12788] WARNING: CPU: 1 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 375.413063][T12788] Modules linked in: [ 375.413072][T12788] CPU: 1 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 375.413075][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 02:59:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x4, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:49 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r1, 0x0, 0x2) chdir(&(0x7f0000000000)='./file0\x00') ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000000c0)=""/210) 02:59:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x4c, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 375.413080][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 375.413085][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 375.413087][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 375.413091][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 375.413094][T12788] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 375.413097][T12788] RBP: ffff8881ac509420 R08: ffffffff814e8437 R09: ffffed103ede5e08 [ 375.413100][T12788] R10: ffffed103ede5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 375.413102][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881e541c550 [ 375.413106][T12788] FS: 000000000307b400(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 375.413109][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 375.413112][T12788] CR2: 00007eff6ff5f718 CR3: 00000001e6c9a000 CR4: 00000000001406e0 [ 375.413117][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 375.413119][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 375.413121][T12788] Call Trace: [ 375.413129][T12788] d_walk+0x2d9/0x540 [ 375.413135][T12788] ? __d_free+0x20/0x20 [ 375.413140][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 375.413147][T12788] generic_shutdown_super+0x63/0x2a0 [ 375.413152][T12788] kill_block_super+0x79/0xd0 [ 375.413158][T12788] deactivate_locked_super+0xaf/0x100 [ 375.413162][T12788] deactivate_super+0x1b3/0x270 [ 375.413168][T12788] ? deactivate_locked_super+0x100/0x100 [ 375.413172][T12788] ? dput+0x4de/0x5d0 [ 375.413177][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 375.413183][T12788] ? find_next_bit+0xc6/0x110 [ 375.413188][T12788] cleanup_mnt+0x432/0x4e0 [ 375.413195][T12788] task_work_run+0x186/0x1b0 [ 375.413202][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 375.413207][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 375.413212][T12788] RIP: 0033:0x467a37 [ 375.413216][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 375.413219][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 375.413223][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 375.413225][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 375.413228][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 02:59:49 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) 02:59:49 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mount$9p_virtio(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000240), 0xa20080, &(0x7f0000000280)={'trans=virtio,', {[{@version_u}], [{@uid_eq={'uid', 0x3d, r1}}]}}) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r3, 0xee01, r4) r5 = getegid() r6 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r6, 0xee01, r7) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [], {0x4, 0x1}, [{0x8, 0x3, r2}, {0x8, 0x0, r2}, {0x8, 0x0, r4}, {0x8, 0x4, r2}, {0x8, 0x3, r5}, {0x8, 0x0, r7}], {}, {0x20, 0x1}}, 0x54, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee00, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x20) 02:59:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x6, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x68, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:49 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) chdir(&(0x7f0000000000)='./file0\x00') 02:59:49 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 375.413231][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 375.413233][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 375.413237][T12788] ---[ end trace ba3eda2bab56d978 ]--- [ 375.465042][ T9404] incfs_lookup_dentry err:-2 [ 375.570476][T12788] VFS: Busy inodes after unmount of loop1. Self-destruct in 5 seconds. Have a nice day... [ 375.638107][T13034] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 02:59:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x9, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x6c, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 375.871557][T13040] incfs_lookup_dentry err:-2 02:59:50 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x21) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x200000, &(0x7f0000000240)={[{@no_bf_readahead={'no_bf_readahead', 0x3d, 0x1}}, {@readahead={'readahead', 0x3d, 0xff}}, {@rlog_wakeup_cnt={'rlog_wakeup_cnt', 0x3d, 0x7fffffff}}], [{@smackfsdef={'smackfsdef', 0x3d, 'system.posix_acl_default\x00'}}, {@uid_gt}]}) 02:59:50 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 02:59:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x10, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 375.917408][T13051] incfs_lookup_dentry err:-2 [ 375.932558][T13051] incfs_lookup_dentry err:-2 02:59:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x74, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 375.960193][T13058] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 375.989006][T13058] EXT4-fs error (device loop1): __ext4_new_inode:930: comm syz-executor.1: reserved inode found cleared - inode=1 [ 376.005552][T13073] incfs_lookup_dentry err:-2 [ 376.022057][T13069] incfs: Options parsing error. -22 [ 376.022984][T13073] incfs_lookup_dentry err:-2 [ 376.035365][T13058] incfs: Can't find or create .index dir in ./file0 [ 376.061181][T13081] incfs: Options parsing error. -22 02:59:50 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:59:50 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x3) 02:59:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x7a, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:50 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$binder(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1028000, &(0x7f0000000100)={[{@stats}, {}, {@stats}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'system.posix_acl_default\x00'}}, {@smackfshat}, {@seclabel}, {@measure}]}) 02:59:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x300, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 376.071269][ T9404] incfs_lookup_dentry err:-2 [ 376.084122][T12788] BUG: Dentry ffff8881f122d330{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 376.093923][T12788] ------------[ cut here ]------------ [ 376.099432][T12788] WARNING: CPU: 0 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 376.107997][T12788] Modules linked in: [ 376.111885][T12788] CPU: 0 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 376.123622][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.130085][T13089] incfs_lookup_dentry err:-2 [ 376.133767][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 376.133779][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 376.163293][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 376.169352][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 376.177316][T12788] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 376.185376][T12788] RBP: ffff8881e448f420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 376.193338][T12788] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 376.201322][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881f122d330 [ 376.209382][T12788] FS: 000000000307b400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 02:59:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r0) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0x8, 0xa177) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:50 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r4 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10, 0x80800) mount$overlay(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x200048, &(0x7f00000004c0)={[{@metacopy_off}, {@index_off}, {@nfs_export_off}, {@nfs_export_on}, {@xino_off}, {@index_on}], [{@hash}, {@smackfsfloor={'smackfsfloor', 0x3d, 'system.posix_acl_default\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'ext4\x00'}}, {@obj_type={'obj_type', 0x3d, ':+-)$\\@}\''}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f00000002c0)={0x1, 0x80000001, 0x3}) fchown(r2, 0xee01, r3) chown(&(0x7f0000000000)='./file0\x00', r1, r3) r5 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) ppoll(&(0x7f0000000380)=[{r5, 0x2200}, {r4, 0x1}, {r6}, {r2, 0x680}, {r4, 0xa000}], 0x5, &(0x7f00000003c0), &(0x7f0000000400)={[0x3]}, 0x8) 02:59:50 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r2, 0x0, 0x800000080004103) 02:59:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x600, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x18c, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x300, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 376.218403][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 376.224979][T12788] CR2: 00007ffdd04e8208 CR3: 00000001e6c9a000 CR4: 00000000001406f0 [ 376.233205][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 376.241169][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 376.249134][T12788] Call Trace: [ 376.252418][T12788] d_walk+0x2d9/0x540 [ 376.256411][T12788] ? __d_free+0x20/0x20 [ 376.260561][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 376.266011][T12788] generic_shutdown_super+0x63/0x2a0 02:59:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x500, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 376.271304][T12788] kill_block_super+0x79/0xd0 [ 376.275970][T12788] deactivate_locked_super+0xaf/0x100 [ 376.281331][T12788] deactivate_super+0x1b3/0x270 [ 376.286171][T12788] ? deactivate_locked_super+0x100/0x100 [ 376.291790][T12788] ? dput+0x4de/0x5d0 [ 376.295759][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 376.301292][T12788] ? find_next_bit+0xc6/0x110 [ 376.305949][T12788] cleanup_mnt+0x432/0x4e0 [ 376.310434][T12788] task_work_run+0x186/0x1b0 [ 376.315015][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 376.320557][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 376.326437][T12788] RIP: 0033:0x467a37 [ 376.330317][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 376.349997][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 376.358442][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 376.366492][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 376.374573][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 376.382734][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 376.390763][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 376.398706][T12788] ---[ end trace ba3eda2bab56d979 ]--- [ 376.404545][T12788] BUG: Dentry ffff8881f122d330{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 376.414445][T12788] ------------[ cut here ]------------ [ 376.419891][T12788] WARNING: CPU: 0 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 376.428438][T12788] Modules linked in: [ 376.432304][T12788] CPU: 0 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 376.444009][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.454040][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 376.459308][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 376.478883][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 376.484920][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 376.493046][T12788] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 376.501032][T12788] RBP: ffff8881e448f420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 376.508971][T12788] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 376.516911][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881f122d330 [ 376.524853][T12788] FS: 000000000307b400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 376.533936][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 376.540488][T12788] CR2: 00007ffdd04e8208 CR3: 00000001e6c9a000 CR4: 00000000001406f0 [ 376.548545][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 376.556486][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 376.564439][T12788] Call Trace: [ 376.567703][T12788] d_walk+0x2d9/0x540 [ 376.571658][T12788] ? __d_free+0x20/0x20 [ 376.575792][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 376.581219][T12788] generic_shutdown_super+0x63/0x2a0 [ 376.586559][T12788] kill_block_super+0x79/0xd0 [ 376.591206][T12788] deactivate_locked_super+0xaf/0x100 [ 376.596560][T12788] deactivate_super+0x1b3/0x270 [ 376.601404][T12788] ? deactivate_locked_super+0x100/0x100 [ 376.607015][T12788] ? dput+0x4de/0x5d0 [ 376.610964][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 376.616474][T12788] ? find_next_bit+0xc6/0x110 [ 376.621206][T12788] cleanup_mnt+0x432/0x4e0 [ 376.625594][T12788] task_work_run+0x186/0x1b0 [ 376.630152][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 376.635693][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 376.641552][T12788] RIP: 0033:0x467a37 [ 376.645419][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 376.664992][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 376.673564][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 376.681506][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 376.689461][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 376.697404][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 376.705648][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 376.713593][T12788] ---[ end trace ba3eda2bab56d97a ]--- [ 376.734837][ T9404] incfs_lookup_dentry err:-2 [ 376.754906][T12788] VFS: Busy inodes after unmount of loop1. Self-destruct in 5 seconds. Have a nice day... [ 376.768552][T13115] EXT4-fs (loop0): Unrecognized mount option "./file0" or missing value [ 376.778880][T13115] overlayfs: unrecognized mount option "hash" or missing value [ 376.785165][T13118] incfs_lookup_dentry err:-2 [ 376.789396][T13121] overlayfs: unrecognized mount option "hash" or missing value [ 376.802743][T13123] incfs_lookup_dentry err:-2 02:59:51 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r3) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3}], {0x4, 0x6}, [{0x8, 0x1, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x8}}, 0x4c, 0x1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) 02:59:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x900, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x600, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:51 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x330004, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite\x00') openat(r1, &(0x7f00000000c0)='./file0\x00', 0x8002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r0, r2, 0x0, 0x800000080004103) 02:59:51 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') [ 376.865543][T13126] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 376.877718][T13126] EXT4-fs error (device loop1): __ext4_new_inode:930: comm syz-executor.1: reserved inode found cleared - inode=1 [ 376.890714][T13126] incfs: Can't find or create .index dir in ./file0 [ 376.903626][T12788] BUG: Dentry ffff8881e547f550{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 376.913410][T12788] ------------[ cut here ]------------ [ 376.918882][T12788] WARNING: CPU: 0 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 376.927378][T12788] Modules linked in: [ 376.931268][T12788] CPU: 0 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 376.942962][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.953045][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 376.958323][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 376.978010][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 376.984177][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 376.992155][T12788] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 377.000143][T12788] RBP: ffff8881e1153420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 377.008198][T12788] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 377.016251][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881e547f550 [ 377.024347][T12788] FS: 000000000307b400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 377.033413][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 377.039974][T12788] CR2: 0000000003084b38 CR3: 00000001e6c9a000 CR4: 00000000001406f0 [ 377.047936][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 377.055885][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 377.063829][T12788] Call Trace: [ 377.067099][T12788] d_walk+0x2d9/0x540 [ 377.071072][T12788] ? __d_free+0x20/0x20 [ 377.075204][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 377.080820][T12788] generic_shutdown_super+0x63/0x2a0 [ 377.086102][T12788] kill_block_super+0x79/0xd0 [ 377.090803][T12788] deactivate_locked_super+0xaf/0x100 [ 377.096149][T12788] deactivate_super+0x1b3/0x270 [ 377.100979][T12788] ? deactivate_locked_super+0x100/0x100 [ 377.106583][T12788] ? dput+0x4de/0x5d0 [ 377.110546][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 377.116100][T12788] ? find_next_bit+0xc6/0x110 [ 377.120795][T12788] cleanup_mnt+0x432/0x4e0 [ 377.125188][T12788] task_work_run+0x186/0x1b0 [ 377.129751][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 377.135271][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 377.141151][T12788] RIP: 0033:0x467a37 [ 377.145028][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 377.164693][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 377.173093][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 377.181058][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 377.189028][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 377.196976][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 377.204923][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 377.212884][T12788] ---[ end trace ba3eda2bab56d97b ]--- [ 377.230322][T12788] BUG: Dentry ffff8881e547f550{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 377.240021][T12788] ------------[ cut here ]------------ [ 377.245463][T12788] WARNING: CPU: 1 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 377.254078][T12788] Modules linked in: [ 377.257949][T12788] CPU: 1 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 377.269654][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.279700][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 377.284957][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 377.304544][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 377.310583][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 377.318537][T12788] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 377.326495][T12788] RBP: ffff8881e1153420 R08: ffffffff814e8437 R09: ffffed103ede5e08 [ 377.334455][T12788] R10: ffffed103ede5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 377.342400][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881e547f550 [ 377.350348][T12788] FS: 000000000307b400(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 377.359251][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 377.365977][T12788] CR2: 0000000000544038 CR3: 00000001e6c9a000 CR4: 00000000001406e0 [ 377.373920][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 377.381982][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 377.389923][T12788] Call Trace: [ 377.393189][T12788] d_walk+0x2d9/0x540 [ 377.397171][T12788] ? __d_free+0x20/0x20 [ 377.401298][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 377.406729][T12788] generic_shutdown_super+0x63/0x2a0 [ 377.412021][T12788] kill_block_super+0x79/0xd0 [ 377.416667][T12788] deactivate_locked_super+0xaf/0x100 [ 377.422007][T12788] deactivate_super+0x1b3/0x270 [ 377.426826][T12788] ? deactivate_locked_super+0x100/0x100 [ 377.432424][T12788] ? dput+0x4de/0x5d0 [ 377.436635][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 377.442151][T12788] ? find_next_bit+0xc6/0x110 [ 377.446804][T12788] cleanup_mnt+0x432/0x4e0 [ 377.451386][T12788] task_work_run+0x186/0x1b0 [ 377.455951][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 377.461473][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 377.467373][T12788] RIP: 0033:0x467a37 [ 377.471257][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 377.490837][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 377.499254][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 377.507201][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 377.515161][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 377.523104][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 377.531070][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 377.539034][T12788] ---[ end trace ba3eda2bab56d97c ]--- [ 377.554930][T12788] VFS: Busy inodes after unmount of loop1. Self-destruct in 5 seconds. Have a nice day... [ 377.598967][T13148] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 377.615152][T13148] EXT4-fs error (device loop1): __ext4_new_inode:930: comm syz-executor.1: reserved inode found cleared - inode=1 [ 377.627655][T13148] incfs: Can't find or create .index dir in ./file0 [ 377.639663][T12788] BUG: Dentry ffff8881a66ad880{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 377.649364][T12788] ------------[ cut here ]------------ [ 377.654812][T12788] WARNING: CPU: 0 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 377.663685][T12788] Modules linked in: [ 377.667574][T12788] CPU: 0 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 377.679265][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.689325][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 377.696089][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 377.715678][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 377.721719][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 377.729683][T12788] RDX: 0000000000000000 RSI: 0000000080000002 RDI: 0000000000000000 [ 377.737645][T12788] RBP: ffff8881b908d420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 377.745591][T12788] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 377.753536][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881a66ad880 [ 377.761485][T12788] FS: 000000000307b400(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 377.770436][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 377.777000][T12788] CR2: 0000000003084b38 CR3: 00000001e6c9a000 CR4: 00000000001406f0 [ 377.784970][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 377.792919][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 377.801035][T12788] Call Trace: [ 377.804328][T12788] d_walk+0x2d9/0x540 [ 377.808547][T12788] ? __d_free+0x20/0x20 [ 377.812790][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 377.818225][T12788] generic_shutdown_super+0x63/0x2a0 [ 377.823485][T12788] kill_block_super+0x79/0xd0 [ 377.828136][T12788] deactivate_locked_super+0xaf/0x100 [ 377.833481][T12788] deactivate_super+0x1b3/0x270 [ 377.838313][T12788] ? deactivate_locked_super+0x100/0x100 [ 377.843938][T12788] ? dput+0x4de/0x5d0 [ 377.847898][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 377.853525][T12788] ? find_next_bit+0xc6/0x110 [ 377.858180][T12788] cleanup_mnt+0x432/0x4e0 [ 377.862699][T12788] task_work_run+0x186/0x1b0 [ 377.867285][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 377.872974][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 377.878844][T12788] RIP: 0033:0x467a37 [ 377.882916][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 377.902749][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 377.911249][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 377.919204][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 377.927167][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 377.935137][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 377.943097][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 377.951063][T12788] ---[ end trace ba3eda2bab56d97d ]--- [ 377.967220][T12788] VFS: Busy inodes after unmount of loop1. Self-destruct in 5 seconds. Have a nice day... 02:59:52 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)={{r0, r1/1000+10000}, {0x0, 0xea60}}) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x1f00, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 02:59:52 executing program 4: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_usb_disconnect(r1) ioctl$EVIOCRMFF(r1, 0x40044581, 0x0) sendfile(r1, r0, 0x0, 0x800000080004104) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) sendfile(r2, r1, &(0x7f0000000000)=0x20, 0x200) 02:59:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x700, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:52 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x202000, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:59:52 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r0, 0xee01, r1) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) [ 378.356931][T13123] incfs_lookup_dentry err:-2 02:59:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x900, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) [ 378.382158][ T9404] incfs_lookup_dentry err:-2 02:59:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x2000, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 378.412616][T13164] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 378.444281][T13165] incfs_lookup_dentry err:-2 02:59:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xa00, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:52 executing program 0: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='pvfs2\x00', 0x0, &(0x7f0000000140)='incremental-fs\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:59:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60, 0x4000, r2}, [@IFLA_LINKINFO={0x4, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) [ 378.457264][T13164] EXT4-fs error (device loop1): __ext4_new_inode:930: comm syz-executor.1: reserved inode found cleared - inode=1 02:59:52 executing program 1: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@private1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) [ 378.505048][T13164] incfs: Can't find or create .index dir in ./file0 [ 378.542319][T12788] BUG: Dentry ffff8881ecf5d990{i=0,n=.index} still in use (1) [unmount of ext4 loop1] 02:59:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0xffffff1f, 0xb00, 0x0, {0x0, 0x60, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x5}, {0x4}}}]}, 0x38}}, 0x0) 02:59:52 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10, 0x4) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004103) ioctl$TIOCL_SELLOADLUT(r3, 0x541c, &(0x7f0000000140)={0x5, 0xf0e2, 0x2, 0x8}) sendfile(r0, r1, 0x0, 0x800000080004103) accept(r1, 0x0, &(0x7f0000000040)) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x3) [ 378.552059][T12788] ------------[ cut here ]------------ [ 378.557524][T12788] WARNING: CPU: 1 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 378.566004][T12788] Modules linked in: [ 378.569895][T12788] CPU: 1 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 378.581510][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.591566][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 378.596838][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 378.616513][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 378.622629][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 378.630617][T12788] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 378.638562][T12788] RBP: ffff8881ac229420 R08: ffffffff814e8437 R09: ffffed103ede5e08 [ 378.646513][T12788] R10: ffffed103ede5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 378.654460][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881ecf5d990 [ 378.662426][T12788] FS: 000000000307b400(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 378.671326][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 378.677974][T12788] CR2: 00007ffe3d3f7c38 CR3: 00000001e6c9a000 CR4: 00000000001406e0 [ 378.685919][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 378.693885][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 378.701925][T12788] Call Trace: [ 378.705203][T12788] d_walk+0x2d9/0x540 [ 378.709158][T12788] ? __d_free+0x20/0x20 [ 378.713285][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 378.718842][T12788] generic_shutdown_super+0x63/0x2a0 [ 378.724102][T12788] kill_block_super+0x79/0xd0 [ 378.728773][T12788] deactivate_locked_super+0xaf/0x100 [ 378.734114][T12788] deactivate_super+0x1b3/0x270 [ 378.738949][T12788] ? deactivate_locked_super+0x100/0x100 [ 378.744577][T12788] ? dput+0x4de/0x5d0 [ 378.748636][T12788] ? _raw_spin_lock_irqsave+0x210/0x210 [ 378.754345][T12788] ? find_next_bit+0xc6/0x110 [ 378.759012][T12788] cleanup_mnt+0x432/0x4e0 [ 378.763412][T12788] task_work_run+0x186/0x1b0 [ 378.767981][T12788] prepare_exit_to_usermode+0x2b0/0x310 [ 378.773502][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 378.779368][T12788] RIP: 0033:0x467a37 [ 378.783236][T12788] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 378.803252][T12788] RSP: 002b:00007ffdfe74a948 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 378.811757][T12788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 378.819724][T12788] RDX: 00007ffdfe74aa19 RSI: 0000000000000002 RDI: 00007ffdfe74aa10 [ 378.827670][T12788] RBP: 00007ffdfe74aa10 R08: 00000000ffffffff R09: 00007ffdfe74a7e0 [ 378.835617][T12788] R10: 000000000307cbd3 R11: 0000000000000246 R12: 00000000004bee70 [ 378.843584][T12788] R13: 00007ffdfe74bae0 R14: 000000000307cb00 R15: 00007ffdfe74bb20 [ 378.851560][T12788] ---[ end trace ba3eda2bab56d97e ]--- [ 378.857799][T12788] BUG: Dentry ffff8881ecf5d990{i=0,n=.index} still in use (1) [unmount of ext4 loop1] [ 378.867492][T12788] ------------[ cut here ]------------ [ 378.873024][T12788] WARNING: CPU: 1 PID: 12788 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 378.881570][T12788] Modules linked in: [ 378.885569][T12788] CPU: 1 PID: 12788 Comm: syz-executor.1 Tainted: G W 5.4.122-syzkaller-00826-g766ec1256935 #0 [ 378.897168][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.907211][T12788] RIP: 0010:umount_check+0x179/0x1c0 [ 378.912483][T12788] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 a0 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 378.932061][T12788] RSP: 0018:ffff8881b60efc58 EFLAGS: 00010282 [ 378.938245][T12788] RAX: 0000000000000054 RBX: ffffffff85fa9d20 RCX: b0c447f874eb9200 [ 378.946189][T12788] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 378.954137][T12788] RBP: ffff8881ac229420 R08: ffffffff814e8437 R09: ffffed103ede5e08 [ 378.962527][T12788] R10: ffffed103ede5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 378.970472][T12788] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881ecf5d990 [ 378.978417][T12788] FS: 000000000307b400(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 378.987315][T12788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 378.993885][T12788] CR2: 000000000050d6f0 CR3: 00000001e6c9a000 CR4: 00000000001406e0 [ 379.001833][T12788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 379.009956][T12788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 379.017914][T12788] Call Trace: [ 379.021216][T12788] d_walk+0x2d9/0x540 [ 379.025172][T12788] ? __d_free+0x20/0x20 [ 379.029300][T12788] shrink_dcache_for_umount+0x8a/0x1a0 [ 379.034905][T12788] generic_shutdown_super+0x63/0x2a0 [ 379.040162][T12788] kill_block_super+0x79/0xd0 [ 379.044824][T12788] deactivate_locked_super+0xaf/0x100 [ 379.050168][T12788] deactivate_super+0x1b3/0x270