28d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 4: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 4: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:14 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 4: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:15 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:16 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1039.229874] hfs: unable to parse mount options 03:33:17 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1039.465648] hfs: unable to parse mount options 03:33:17 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:17 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1039.754276] hfs: unable to parse mount options [ 1039.785988] hfs: unable to parse mount options 03:33:18 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:18 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1040.112027] hfs: unable to parse mount options 03:33:18 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:18 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:18 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) [ 1040.462638] hfs: unable to parse mount options 03:33:18 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) [ 1040.665140] hfs: unable to parse mount options 03:33:19 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1040.845858] hfs: unable to parse mount options 03:33:19 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) [ 1040.956588] hfs: unable to parse mount options [ 1040.995356] hfs: unable to parse mount options 03:33:19 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1041.217049] hfs: unable to parse mount options 03:33:19 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) [ 1041.350432] hfs: unable to parse mount options [ 1041.392057] hfs: unable to parse mount options 03:33:19 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:19 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:19 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:20 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1041.635308] hfs: unable to parse mount options [ 1041.675768] hfs: unable to parse mount options 03:33:20 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:20 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:20 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:20 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}]}) 03:33:20 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:20 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:20 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:20 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}]}) 03:33:20 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:20 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:20 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:21 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}]}) 03:33:21 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:21 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:21 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)) 03:33:21 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:21 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:21 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}]}) 03:33:21 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:21 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:21 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:21 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:21 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:21 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)) 03:33:21 executing program 2: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:21 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}]}) 03:33:21 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:22 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}]}) 03:33:22 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:22 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:22 executing program 2: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:22 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}]}) 03:33:22 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:22 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}]}) 03:33:22 executing program 2: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:22 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:22 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:22 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)) 03:33:22 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)) 03:33:22 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}]}) 03:33:22 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}]}) 03:33:22 executing program 2: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:22 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}]}) 03:33:23 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:23 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:23 executing program 2: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1044.806659] hfs: unable to parse mount options 03:33:23 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}]}) 03:33:23 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 0: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) [ 1045.111828] hfs: unable to parse mount options 03:33:23 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 4: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)) 03:33:23 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:23 executing program 0: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1045.604678] hfs: unable to parse mount options 03:33:24 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 1: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 4: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1045.790466] hfs: unable to parse mount options 03:33:24 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1046.781651] hfs: unable to parse mount options 03:33:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', 0x0, 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020}, 0x2020) r2 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1047.291823] hfs: unable to parse mount options 03:33:25 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000003280)='gtp\x00', r1) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000003340)={&(0x7f0000003240), 0xc, &(0x7f0000003300)={&(0x7f0000003380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00012abd7000fedbdf270100000008000800e03bbd0c7f00294b0100000008000500ac124404d3d609f2291e0001730dd246f2e62dc917f78f8d6b6a900b0e1381595b3254f6fb6e89b2b8f8722b479f0bd8e70a044e3539a940855e9a0a300a3682d3bd8b181b65eb7ca66b043237fde95b0008fe61f9ae"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4014) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:25 executing program 3: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:26 executing program 0: socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) 03:33:26 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000003280)='gtp\x00', r1) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x3, 0x301) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001140)={0x2020, 0x0, 0x0}, 0x2020) r4 = syz_open_dev$audion(&(0x7f00000031c0)='/dev/audio#\x00', 0x8, 0x80000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000003200)={0x2, [0x8, 0x5], 0x9}, 0x10) write$FUSE_IOCTL(r2, &(0x7f0000003180)={0x20, 0xfffffffffffffff5, r3, {0x9, 0x0, 0x45c5, 0x4}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB='H\x00k\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf2506000000058b373c5763bb0021000100000008000c00000b00030000000c000f00ff01000000000000050022000000000005000700030000009ff1493a644b442fc8d181cb50533dee3a71df2e3cd6616c72f9ece9e701cf66c09bf5e73ecd955809799d0c63c1875454a9a8356841fad6da235dfb11dee26d4f20e6ecee0207e3573777d5403c51340b7718a9d47e4a5b955bd3f2de47706c4bdebe36526c672fe5d4c0874b398d8fb398780b67326595"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000003280)='gtp\x00', r1) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000003340)={&(0x7f0000003240), 0xc, &(0x7f0000003300)={&(0x7f0000003380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00012abd7000fedbdf270100000008000800e03bbd0c7f00294b0100000008000500ac124404d3d609f2291e0001730dd246f2e62dc917f78f8d6b6a900b0e1381595b3254f6fb6e89b2b8f8722b479f0bd8e70a044e3539a940855e9a0a300a3682d3bd8b181b65eb7ca66b043237fde95b0008fe61f9ae"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4014) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r5, 0x84009422, &(0x7f0000000d00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x5, 0x1, &(0x7f00000009c0)=[{&(0x7f00000008c0)="64bfa17301eaeb38236d34f24850cafaa930e5eaf79e0011d0f9e2dedbbdb93c608246c566b0d00f5c05225bde706a30f36db45c7d6c2f37b7f2aaa81ee18ac2bb4d71caa3a971021ad5dd4f4d292e248d41b9e2135e132f3eddcb20ad81a1428d7689c43e3595f96a3e8c2c367662b6aaa48db25f2e42c1a99e60a89a93719b96eb26fdecfc17b240c662f876ce93b74623242a8d5f413c024b67de02bb1437286756e3b3393d5cf60a83d7193cee23b6fc92c231cfce824e4af70369655db1f5c17d2bf5bb4684db99ff9d2c7369e5b990e8d24bc3f0471c6f553271c29969ae935330f1a5d3f6a8", 0xe9, 0x8922}], 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1047.674321] hfs: unable to parse mount options [ 1047.679819] hfs: unable to parse mount options 03:33:26 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:26 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:26 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x5451, 0x0) 03:33:26 executing program 0: socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) 03:33:26 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:26 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) bind$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x9}}, 0x24) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="6af0f0ac68ed0bc3d92f5479da91f12e24000001", @ANYRES16=r0, @ANYBLOB="00082abd7000fedbdf1e06000800000000007700000108000900bb3f0000"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4081) r2 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="83bb962b", @ANYRES16=r0, @ANYBLOB="00022dbd7000010000000800000006001b004e22000008001900ac1414bb06001d00ff7f00000c0016000000000000000000"], 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x60, 0x0, 0x10, 0x70bd27, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) 03:33:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)=ANY=[@ANYBLOB="14fdff00", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00'], 0x14}}, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) 03:33:26 executing program 3: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', 0xffffffffffffffff) r1 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x4, 0x28000) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000700)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, r2, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, [], 0x1d}}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x44004}, 0x84) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, r0, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={[], [], @rand_addr=0x64010101}}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x74}, 0x1, 0x0, 0x0, 0x84}, 0x4805) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0)='ethtool\x00', 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'syztnl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8, 0x7800, 0xffff, 0x5, {{0x17, 0x4, 0x0, 0x1, 0x5c, 0x65, 0x0, 0xff, 0x2f, 0x0, @empty, @empty, {[@end, @rr={0x7, 0xb, 0x36, [@multicast1, @private=0xa010101]}, @timestamp={0x44, 0x14, 0xc4, 0x0, 0x7, [0x10001, 0x3, 0x20, 0x3]}, @end, @cipso={0x86, 0x10, 0x2, [{0x2, 0x8, "cd76a514f221"}, {0x2, 0x2}]}, @ra={0x94, 0x4}, @ssrr={0x89, 0x13, 0x91, [@remote, @broadcast, @rand_addr=0x64010100, @private=0xa010102]}]}}}}}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000300)=0x0, &(0x7f0000000340)=0x4) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x2f, 0x9, 0x81, 0x81, 0x32, @loopback, @ipv4={[], [], @multicast2}, 0x10, 0x7800, 0x5, 0x21f0ae8f}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xd4, r3, 0x101, 0x70bd2a, 0x25dfdbfd, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x34000080}, 0x4) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x5421, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000005c0)={0x7f, 0x7, 0x4, 0xe000, 0x3ff, {}, {0x3, 0x8, 0x5, 0xf3, 0xb2, 0x7, "704add2f"}, 0x9, 0x4, @userptr=0x2, 0x0, 0x0, 0xffffffffffffffff}) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000640)={0x1200000, 0x0, 0x4, 0xee1c3d153bf106d6, 0x3, {0x0, 0x2710}, {0x2, 0x8, 0x9, 0x6, 0x7f, 0x4, "4acd601d"}, 0x40, 0x6, @offset, 0x7fffffff, 0x0, r8}) 03:33:26 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x8, 0x10, 0x0, 0x6, {{0x14, 0x4, 0x3, 0xa, 0x50, 0x66, 0x0, 0x20, 0x2f, 0x0, @private=0xa010100, @loopback, {[@ssrr={0x89, 0x1f, 0xfa, [@broadcast, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @local, @multicast2]}, @timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x8, [{@remote, 0x7f}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x90, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}]}, 0x90}, 0x1, 0x0, 0x0, 0x24000000}, 0x8000) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x40, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x40}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x45}, 0x4000000) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, r2) 03:33:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) getsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000300), &(0x7f0000000340)=0x4) r2 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) getsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x4, 0x98, 0x40, 0x1, 0x66, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7, 0x8000, 0x3, 0x2}}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000000) r3 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x40}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x401}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xffffffff00000000}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0)='l2tp\x00', r3) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x2c, r5, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x40}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40004}, 0x400c800) 03:33:26 executing program 4: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x20000010) r2 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) 03:33:26 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:26 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x8, 0x10, 0x0, 0x6, {{0x14, 0x4, 0x3, 0xa, 0x50, 0x66, 0x0, 0x20, 0x2f, 0x0, @private=0xa010100, @loopback, {[@ssrr={0x89, 0x1f, 0xfa, [@broadcast, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @local, @multicast2]}, @timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x8, [{@remote, 0x7f}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x90, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}]}, 0x90}, 0x1, 0x0, 0x0, 0x24000000}, 0x8000) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x40, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x40}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x45}, 0x4000000) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, r2) 03:33:26 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:26 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x8, 0x10, 0x0, 0x6, {{0x14, 0x4, 0x3, 0xa, 0x50, 0x66, 0x0, 0x20, 0x2f, 0x0, @private=0xa010100, @loopback, {[@ssrr={0x89, 0x1f, 0xfa, [@broadcast, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @local, @multicast2]}, @timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x8, [{@remote, 0x7f}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x90, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}]}, 0x90}, 0x1, 0x0, 0x0, 0x24000000}, 0x8000) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x40, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x40}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x45}, 0x4000000) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, r2) 03:33:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000000dc0)={{r2}, 0x0, 0x4, @inherit={0x70, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000000000000050000000000000005000000000000002acf0000000000001400000000000000080000000000000005000000000000000400000000000000050000000000000004000000000000000400000000000000008000000000000003000000000000000700000000000000449919bb0b044d737b58"]}, @name="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"}) r3 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000000)=0x1, 0x4) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) 03:33:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000000dc0)={{r2}, 0x0, 0x4, @inherit={0x70, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000000000000050000000000000005000000000000002acf0000000000001400000000000000080000000000000005000000000000000400000000000000050000000000000004000000000000000400000000000000008000000000000003000000000000000700000000000000449919bb0b044d737b58"]}, @name="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"}) r3 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000000)=0x1, 0x4) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) 03:33:26 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:26 executing program 1: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:26 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x8, 0x10, 0x0, 0x6, {{0x14, 0x4, 0x3, 0xa, 0x50, 0x66, 0x0, 0x20, 0x2f, 0x0, @private=0xa010100, @loopback, {[@ssrr={0x89, 0x1f, 0xfa, [@broadcast, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @local, @multicast2]}, @timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x8, [{@remote, 0x7f}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x90, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}]}, 0x90}, 0x1, 0x0, 0x0, 0x24000000}, 0x8000) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x40, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x40}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x45}, 0x4000000) 03:33:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000000dc0)={{r2}, 0x0, 0x4, @inherit={0x70, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000000000000050000000000000005000000000000002acf0000000000001400000000000000080000000000000005000000000000000400000000000000050000000000000004000000000000000400000000000000008000000000000003000000000000000700000000000000449919bb0b044d737b58"]}, @name="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"}) r3 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000000)=0x1, 0x4) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) 03:33:27 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:27 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:27 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x8, 0x10, 0x0, 0x6, {{0x14, 0x4, 0x3, 0xa, 0x50, 0x66, 0x0, 0x20, 0x2f, 0x0, @private=0xa010100, @loopback, {[@ssrr={0x89, 0x1f, 0xfa, [@broadcast, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @local, @multicast2]}, @timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x8, [{@remote, 0x7f}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x90, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}]}, 0x90}, 0x1, 0x0, 0x0, 0x24000000}, 0x8000) 03:33:27 executing program 4: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x8, 0x10, 0x0, 0x6, {{0x14, 0x4, 0x3, 0xa, 0x50, 0x66, 0x0, 0x20, 0x2f, 0x0, @private=0xa010100, @loopback, {[@ssrr={0x89, 0x1f, 0xfa, [@broadcast, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @local, @multicast2]}, @timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x8, [{@remote, 0x7f}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x90, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}]}, 0x90}, 0x1, 0x0, 0x0, 0x24000000}, 0x8000) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x40, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x40}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x45}, 0x4000000) 03:33:27 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:27 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x8, 0x10, 0x0, 0x6, {{0x14, 0x4, 0x3, 0xa, 0x50, 0x66, 0x0, 0x20, 0x2f, 0x0, @private=0xa010100, @loopback, {[@ssrr={0x89, 0x1f, 0xfa, [@broadcast, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @local, @multicast2]}, @timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x8, [{@remote, 0x7f}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) 03:33:27 executing program 1: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000000dc0)={{r2}, 0x0, 0x4, @inherit={0x70, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000000000000050000000000000005000000000000002acf0000000000001400000000000000080000000000000005000000000000000400000000000000050000000000000004000000000000000400000000000000008000000000000003000000000000000700000000000000449919bb0b044d737b58"]}, @name="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"}) r3 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000000)=0x1, 0x4) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) [ 1048.762089] hfs: unable to parse mount options 03:33:27 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0x5411, 0x0) 03:33:27 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:27 executing program 3: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:27 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) 03:33:27 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:27 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0x5411, 0x0) 03:33:27 executing program 1: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) [ 1049.251855] hfs: unable to parse mount options 03:33:27 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:27 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0x5411, 0x0) [ 1049.295302] hfs: unable to parse mount options 03:33:27 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}, {@codepage={'codepage', 0x3d, 'iso8859-14'}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:27 executing program 3: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x8, 0x10, 0x0, 0x6, {{0x14, 0x4, 0x3, 0xa, 0x50, 0x66, 0x0, 0x20, 0x2f, 0x0, @private=0xa010100, @loopback, {[@ssrr={0x89, 0x1f, 0xfa, [@broadcast, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @local, @multicast2]}, @timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x8, [{@remote, 0x7f}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) 03:33:27 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:28 executing program 1: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:28 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) socket$nl_generic(0x10, 0x3, 0x10) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) 03:33:28 executing program 3: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x8, 0x10, 0x0, 0x6, {{0x14, 0x4, 0x3, 0xa, 0x50, 0x66, 0x0, 0x20, 0x2f, 0x0, @private=0xa010100, @loopback, {[@ssrr={0x89, 0x1f, 0xfa, [@broadcast, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @local, @multicast2]}, @timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x8, [{@remote, 0x7f}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) 03:33:28 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}]}) [ 1049.647862] hfs: unable to parse mount options 03:33:28 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:28 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 3: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x8, 0x10, 0x0, 0x6, {{0x14, 0x4, 0x3, 0xa, 0x50, 0x66, 0x0, 0x20, 0x2f, 0x0, @private=0xa010100, @loopback, {[@ssrr={0x89, 0x1f, 0xfa, [@broadcast, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x2c}, @empty, @local, @multicast2]}, @timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x8, [{@remote, 0x7f}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) 03:33:28 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:28 executing program 1: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}]}) 03:33:28 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:28 executing program 3: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) 03:33:28 executing program 1: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 0: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 4: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:28 executing program 5: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x20000081) syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)) 03:33:28 executing program 0: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 1: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 3: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 4: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:28 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:28 executing program 0: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 1: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00@', @ANYRES16=0x0, @ANYBLOB="0000000000000000080000e3fe9e2e90cbb0bfff005c6400"], 0x14}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 3: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) socket$nl_generic(0x10, 0x3, 0x10) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 0: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 5: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:28 executing program 1: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) socket$nl_generic(0x10, 0x3, 0x10) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:28 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[{@umask={'umask', 0x3d, 0x7}}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:29 executing program 4: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:29 executing program 3: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 1: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp6(0xa, 0x2, 0x73) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 0: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 4: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:29 executing program 3: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 5: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, 0x0) 03:33:29 executing program 0: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 1: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 4: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:29 executing program 3: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 03:33:29 executing program 0: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 1: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 4: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:29 executing program 3: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 5: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 1: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 0: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 3: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '\xf8'}}]}) 03:33:29 executing program 1: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 5: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x40000) 03:33:29 executing program 3: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 1: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 0: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:29 executing program 5: keyctl$negate(0xd, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:29 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}]}) 03:33:29 executing program 3: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x40000) 03:33:30 executing program 0: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:30 executing program 5: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 1: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 3: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)) 03:33:30 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x40000) 03:33:30 executing program 0: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:30 executing program 1: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 5: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 3: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:30 executing program 0: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e"}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 2: syz_mount_image$hfs(&(0x7f0000000840)='hfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x101081, &(0x7f0000000a00)={[], [{@subj_type={'subj_type'}}]}) 03:33:30 executing program 5: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 1: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:30 executing program 3: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 0: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:30 executing program 2: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdfa46f8972a0d48bef717f2433842c9d5433649fb1c2e559bd319ca7c17e0bcf1b06c52998f2902c9f62ca459b", 0xb0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:30 executing program 1: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:30 executing program 5: add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xde3, 0x105c00) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000240)='gtp\x00', r2) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x4, 0x8, 0x1f, 0x4, 0x1, @mcast2, @ipv4={[], [], @remote}, 0x20, 0x7, 0x80000000, 0x5}}) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, r4, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_LINK={0x8, 0x1, r5}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040)="3c56269e8f181e40ede3a92fcbcd10d5b2500c6d18cc3d1e8a745e896e76125d3f6dfc034017c95db05cc92182d79e99037e5cf0597c331afa2f4adf9af025dd23bc9def727f8e1d3d5c09876eed82eca5d3c2c4c6139b9254650504fe3bb3b40ceb8ed209e584cbc91cc740a273d48503b49f94653f37b94453813afefcb4f6bd10cf15f0f28f8a969abb25d3d3b0b1242d2869a387ffa6c926bb761b0d2e4c3e6d628f3991b5bf177aa048df3a2488af6d2420deff823ac32af3c164a6a91929ee00d902d255b942746e2cd808eb49da0c05a0be3204be7560616abc2641766a880da4d149ac6a929b494bfdc37fea2f9dc0f26695990a5b8f", &(0x7f0000000140)=@tcp=r1, 0x2}, 0x20) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x3ff, 0x4a403) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r6, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r6, 0x541b, 0x0) 03:33:30 executing program 3: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:30 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5, 0x0, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000400)={0x80000000, 0x9, 0x4, 0x0, 0x6, {r2, r3/1000+60000}, {0x5, 0x0, 0xc7, 0x1, 0x7a, 0x83, "6eb9d40d"}, 0xee, 0x4, @planes=&(0x7f00000003c0)={0x101, 0x2, @fd=r4, 0x3}, 0x9}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x800) 03:33:30 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:30 executing program 5: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:30 executing program 1: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:30 executing program 3: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:30 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3ff, 0x800) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x4) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000380)={0x368, 0x0, 0xa00, 0x10, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x1f8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xfb, 0x4, "a4cacfacdc385114fcda0c4f894c0acef5d36dda740efef4d911f7906cfc494fc046b2a2399c4d6bd7d7202a91878a2ccf08974bdb11db8be4b44c37262c69e55eb1f8f44642c93cf52c3a123c5af8755c0f525a8b7f90abba669b4509e0142c31b7120cebd7ddbc90f49c17e7a0d56358f3dbb721a5093bf2d60f22441da73b849e9d60f1f3f1489e0fb80069cfd0919dc64d9b00417655e2f444ae81feb9316191625f4dab77fcc06aa108bc8f399045c11a891cacbcbb36f89ab772a0e219fef6f0695f19e4dcafff6704d788f469ce07028f23445380f1734e5aefe368706a395bae16979d456487039f86782e4b29196fd4fa0903"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xf4, 0x4, "550a267fd65a28baea12f34bc5314ceeac5a925abe73862b5873ec279d7847fce839ad274e14621979ec24b53ff25c79b8e03965e86f6a132130098d5f95b5a58201a7724349502311686f685cf261098085322d0eb7b6d1d0d7d267b71034ff8ee6d778c806bc22098d4a1b89ddeb69776f35bde980875677ed75a0391bbe2f56ec0cfeece881a8f0c1c97e5b1c95de40f9ae6c6f1082b18cd2a4ff5de6390fbf6f38227cab88b4ad4502cf6fd3dec836d028c3de5a77b1e21c5c742133d69a179df7dec2d0c2bca4b4b9a42eb8291a16adc05d8e29835eb07c051181d186da73c3df266f89744f285147bbae31f109"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x10c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xe6, 0x4, "f60a27fd722c04d911bff089285ca43e48fb4797d5e4f24030e9224d6b8dad359cdde31b5935caffeff365cd8d1917bd22b4d60a6e8217b13e5a14a8ecf0caa0447554d03c4a99da9932775b6774537db537f4606968195011f01936e4bff7701e2d9d351a4c395dde64554fed9c36b48bbdb23940fef9361d404908540422d65e82a633d6fd2591f544afb105778b725596364aedb0612e42faefce5842dfca9f7fe6cd21a1554572a787984c185294d8f6245cc534e108b9138b0a1ca2d5d914812b6982d895c7e21634280e3133fb6f08b3782ed8d635d5672bc2a45dc8f2fc50"}, @ETHTOOL_A_BITSET_VALUE={0x1f, 0x4, "396b064fedde44b3359f349bfef2fbf96e7a5da4b63e0fa202f0b7"}]}, @ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x368}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000004) ioctl$BTRFS_IOC_DEV_INFO(r1, 0x541b, 0x0) 03:33:31 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5, 0x0, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000400)={0x80000000, 0x9, 0x4, 0x0, 0x6, {r2, r3/1000+60000}, {0x5, 0x0, 0xc7, 0x1, 0x7a, 0x83, "6eb9d40d"}, 0xee, 0x4, @planes=&(0x7f00000003c0)={0x101, 0x2, @fd=r4, 0x3}, 0x9}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x800) 03:33:31 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:31 executing program 5: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:31 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5, 0x0, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000400)={0x80000000, 0x9, 0x4, 0x0, 0x6, {r2, r3/1000+60000}, {0x5, 0x0, 0xc7, 0x1, 0x7a, 0x83, "6eb9d40d"}, 0xee, 0x4, @planes=&(0x7f00000003c0)={0x101, 0x2, @fd=r4, 0x3}, 0x9}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x800) 03:33:31 executing program 1: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:31 executing program 3: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:31 executing program 0: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x6) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000000)={{}, 0x0, 0x0, @unused=[0x469e, 0x5, 0x10000], @name="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"}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) [ 1052.718854] ieee802154 phy0 wpan0: encryption failed: -22 03:33:31 executing program 5: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e", 0x3a}, 0x48, 0xfffffffffffffffb) 03:33:31 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:31 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5, 0x0, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000400)={0x80000000, 0x9, 0x4, 0x0, 0x6, {r2, r3/1000+60000}, {0x5, 0x0, 0xc7, 0x1, 0x7a, 0x83, "6eb9d40d"}, 0xee, 0x4, @planes=&(0x7f00000003c0)={0x101, 0x2, @fd=r4, 0x3}, 0x9}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) 03:33:31 executing program 1: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 03:33:31 executing program 3: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e"}, 0x48, 0xfffffffffffffffb) [ 1053.000124] ieee802154 phy0 wpan0: encryption failed: -22 03:33:31 executing program 5: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:31 executing program 1: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e"}, 0x48, 0xfffffffffffffffb) 03:33:31 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5}) r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r3 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000400)={0x80000000, 0x9, 0x4, 0x0, 0x6, {r1, r2/1000+60000}, {0x5, 0x0, 0xc7, 0x1, 0x7a, 0x83, "6eb9d40d"}, 0xee, 0x4, @planes=&(0x7f00000003c0)={0x101, 0x2, @fd=r3, 0x3}, 0x9}) 03:33:31 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:31 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r8, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) sendmsg$ETHTOOL_MSG_PAUSE_GET(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='d\x00m\x00', @ANYRES16=0x0, @ANYBLOB="200029bd7000fedbdf2515000000500001801400020000000000000000000000000000000000140002006d6163766c616e300000000000000000080003000300000014000200776730000000000000000000000000000800030000000000"], 0x64}}, 0x40800) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x5451, 0x0) 03:33:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 03:33:31 executing program 5: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) [ 1053.279438] ieee802154 phy0 wpan0: encryption failed: -22 03:33:31 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5}) r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) 03:33:31 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 03:33:31 executing program 5: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:31 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008011}, 0x20000000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00', 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r1, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffff7fff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4bff10138762cda8) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x5421, 0x0) 03:33:31 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5}) r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) 03:33:32 executing program 5: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000400)={0x0, "4e50791ac8c95bf1c9e23eebe314ceb9f817428c68bc11c8db8613dde2dd9695a32bf51dbf4ed11f25eccf7245d5741de39397360f604a0bad99d5b3075f5d1e"}, 0x48, 0xfffffffffffffffb) [ 1053.479209] ieee802154 phy0 wpan0: encryption failed: -22 [ 1053.490065] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:32 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:32 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r8, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) sendmsg$ETHTOOL_MSG_PAUSE_GET(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='d\x00m\x00', @ANYRES16=0x0, @ANYBLOB="200029bd7000fedbdf2515000000500001801400020000000000000000000000000000000000140002006d6163766c616e300000000000000000080003000300000014000200776730000000000000000000000000000800030000000000"], 0x64}}, 0x40800) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x5451, 0x0) 03:33:32 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:32 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5}) syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) [ 1053.678188] ieee802154 phy0 wpan0: encryption failed: -22 03:33:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:32 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:32 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1053.731262] ieee802154 phy0 wpan0: encryption failed: -22 03:33:32 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5}) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) 03:33:32 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5}) syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) [ 1053.843142] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" [ 1053.886273] ieee802154 phy0 wpan0: encryption failed: -22 [ 1053.898555] ieee802154 phy0 wpan0: encryption failed: -22 03:33:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:32 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008011}, 0x20000000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00', 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r1, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffff7fff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4bff10138762cda8) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x5421, 0x0) 03:33:32 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:32 executing program 1: semget(0x3, 0x2, 0x300) r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x6, 0x55e383) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 03:33:32 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r8, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) sendmsg$ETHTOOL_MSG_PAUSE_GET(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='d\x00m\x00', @ANYRES16=0x0, @ANYBLOB="200029bd7000fedbdf2515000000500001801400020000000000000000000000000000000000140002006d6163766c616e300000000000000000080003000300000014000200776730000000000000000000000000000800030000000000"], 0x64}}, 0x40800) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x5451, 0x0) 03:33:32 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5}) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) 03:33:32 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:32 executing program 1: semget(0x3, 0x2, 0x300) r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x6, 0x55e383) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) [ 1054.183336] ieee802154 phy0 wpan0: encryption failed: -22 03:33:32 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:32 executing program 1: semget(0x3, 0x2, 0x300) r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x6, 0x55e383) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) [ 1054.300102] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:32 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008011}, 0x20000000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00', 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r1, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffff7fff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4bff10138762cda8) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x5421, 0x0) 03:33:32 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7f, 0x4, 0x4, 0x4, 0x6, {0x77359400}, {0x1, 0xc, 0x8, 0xab, 0x0, 0x80, "2df7760b"}, 0xd1, 0x1, @planes=&(0x7f0000000000)={0x9, 0x6, @mem_offset=0x7da3, 0x7}, 0x5}) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) 03:33:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:32 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r7, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) sendmsg$ETHTOOL_MSG_PAUSE_GET(r7, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='d\x00m\x00', @ANYRES16=0x0, @ANYBLOB="200029bd7000fedbdf2515000000500001801400020000000000000000000000000000000000140002006d6163766c616e300000000000000000080003000300000014000200776730000000000000000000000000000800030000000000"], 0x64}}, 0x40800) 03:33:32 executing program 1: semget(0x3, 0x2, 0x300) syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x6, 0x55e383) [ 1054.474626] ieee802154 phy0 wpan0: encryption failed: -22 03:33:33 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) 03:33:33 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:33 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008011}, 0x20000000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00', 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r1, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffff7fff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4bff10138762cda8) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x5421, 0x0) 03:33:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1054.580680] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:33 executing program 1: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x6, 0x55e383) 03:33:33 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r7, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:33 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008011}, 0x20000000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00', 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r1, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffff7fff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4bff10138762cda8) socket$nl_generic(0x10, 0x3, 0x10) 03:33:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:33 executing program 2: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) [ 1054.891724] ieee802154 phy0 wpan0: encryption failed: -22 03:33:33 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008011}, 0x20000000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00', 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r1, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffff7fff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4bff10138762cda8) 03:33:33 executing program 1: syz_open_dev$audion(0x0, 0x6, 0x55e383) [ 1054.961520] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:33 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f79fdf", 0x84}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:33 executing program 2: syz_open_dev$audion(0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) 03:33:33 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:33 executing program 1: syz_open_dev$audion(0x0, 0x6, 0x55e383) 03:33:33 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008011}, 0x20000000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x0, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffff7fff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4bff10138762cda8) 03:33:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:33 executing program 2: syz_open_dev$audion(0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) 03:33:33 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:33 executing program 1: syz_open_dev$audion(0x0, 0x6, 0x55e383) [ 1055.330845] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:33 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008011}, 0x20000000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x0, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffff7fff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4bff10138762cda8) 03:33:33 executing program 2: syz_open_dev$audion(0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) 03:33:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:33 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) [ 1055.484259] ieee802154 phy0 wpan0: encryption failed: -22 [ 1055.516789] ieee802154 phy0 wpan0: encryption failed: -22 [ 1055.522803] ieee802154 phy1 wpan1: encryption failed: -22 03:33:34 executing program 1: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x55e383) 03:33:34 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:34 executing program 5: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x0, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffff7fff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4bff10138762cda8) 03:33:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:34 executing program 2: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0xe6, 0x8001) [ 1055.703063] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" [ 1055.705115] ieee802154 phy0 wpan0: encryption failed: -22 03:33:34 executing program 1: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) 03:33:34 executing program 5: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4bff10138762cda8) 03:33:34 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:34 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:34 executing program 2: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0xe6, 0x8001) 03:33:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x7c, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:34 executing program 1: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) 03:33:34 executing program 5: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) [ 1056.061610] ieee802154 phy0 wpan0: encryption failed: -22 [ 1056.101390] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:34 executing program 2: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0xe6, 0x8001) 03:33:34 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f", 0x6e}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x1, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:34 executing program 1: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) 03:33:34 executing program 5: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) 03:33:34 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r7, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) [ 1056.335928] ieee802154 phy0 wpan0: encryption failed: -22 03:33:34 executing program 2: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x0, 0x8001) 03:33:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:34 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:34 executing program 5: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) 03:33:34 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f", 0x6e}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1056.516430] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:35 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:35 executing program 2: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x0, 0x0) [ 1056.672162] ieee802154 phy0 wpan0: encryption failed: -22 03:33:35 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f", 0x6e}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:35 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000004400)={0x10, 0x0, r2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r3}}, {@euid_eq={'euid', 0x3d, r4}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60040, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1056.738881] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:35 executing program 2: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x0, 0x0) 03:33:35 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) [ 1056.870421] ieee802154 phy0 wpan0: encryption failed: -22 [ 1056.906415] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:35 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796", 0x79}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:35 executing program 2: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x0, 0x0) [ 1057.020582] ieee802154 phy0 wpan0: encryption failed: -22 [ 1057.034629] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:35 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796", 0x79}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1057.077606] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:35 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000004400)={0x10, 0x0, r2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r3}}, {@euid_eq={'euid', 0x3d, r4}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:35 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796", 0x79}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1057.151527] ieee802154 phy0 wpan0: encryption failed: -22 03:33:35 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:35 executing program 1: syz_open_dev$audion(0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xe6, 0x8001) 03:33:35 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796", 0x79}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1057.332422] ieee802154 phy0 wpan0: encryption failed: -22 03:33:35 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r7, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) [ 1057.407184] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:35 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000004400)={0x10, 0x0, r3}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000021c0)={0xa0, 0x0, r3, {{0x3, 0x1, 0x9, 0x3, 0x401, 0x3000, {0x4, 0xa5, 0x7ce5, 0x3f, 0x1, 0x7ff, 0x2, 0xb7, 0x7, 0xc000, 0x20, r5, r6, 0x10001, 0x60a}}, {0x0, 0x10}}}, 0xa0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r7, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) sendmsg$ETHTOOL_MSG_PAUSE_GET(r7, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='d\x00m\x00', @ANYRES16=0x0, @ANYBLOB="200029bd7000fedbdf2515000000500001801400020000000000000000000000000000000000140002006d6163766c616e300000000000000000080003000300000014000200776730000000000000000000000000000800030000000000"], 0x64}}, 0x40800) [ 1057.482302] ieee802154 phy0 wpan0: encryption failed: -22 03:33:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:36 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:36 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000004400)={0x10, 0x0, r2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) getuid() r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) [ 1057.565107] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "appraise" [ 1057.671613] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "appraise" [ 1057.685295] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "appraise" [ 1057.686460] ieee802154 phy0 wpan0: encryption failed: -22 03:33:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:36 executing program 5: semget(0x3, 0x2, 0x300) syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x6, 0x55e383) 03:33:36 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:36 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000004400)={0x10, 0x0, r2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) getuid() r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:36 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000004400)={0x10, 0x0, r2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:36 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:36 executing program 5: semget(0x3, 0x2, 0x300) syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x6, 0x55e383) [ 1058.035676] ieee802154 phy0 wpan0: encryption failed: -22 03:33:36 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:36 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000004400)={0x10, 0x0, r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:36 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1058.158272] ieee802154 phy0 wpan0: encryption failed: -22 03:33:36 executing program 5: semget(0x3, 0x2, 0x300) syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x6, 0x55e383) 03:33:36 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1058.287678] ieee802154 phy0 wpan0: encryption failed: -22 [ 1058.293473] ieee802154 phy0 wpan0: encryption failed: -22 03:33:36 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000023c0)={0x2020}, 0x2020) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:36 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:36 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:36 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd2428f7", 0x82}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1058.438578] ieee802154 phy0 wpan0: encryption failed: -22 03:33:36 executing program 5: semget(0x3, 0x2, 0x300) 03:33:37 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) [ 1058.516290] ieee802154 phy0 wpan0: encryption failed: -22 [ 1058.522225] ieee802154 phy0 wpan0: encryption failed: -22 03:33:37 executing program 1: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:37 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1058.979949] ieee802154 phy0 wpan0: encryption failed: -22 03:33:37 executing program 1: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:37 executing program 5: semget(0x3, 0x0, 0x300) 03:33:37 executing program 2: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:37 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:37 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd24", 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:37 executing program 1: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:37 executing program 5: semget(0x3, 0x0, 0x0) 03:33:37 executing program 2: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:37 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:37 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aace", 0x7e}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:37 executing program 5: semget(0x3, 0x2, 0x300) r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x6, 0x55e383) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 03:33:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:37 executing program 2: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:37 executing program 1: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) [ 1059.548921] ieee802154 phy0 wpan0: encryption failed: -22 03:33:38 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aace", 0x7e}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040}, 0x40000) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e20, @rand_addr=0x64010100}}, 0x24) 03:33:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:38 executing program 2: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:38 executing program 1: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:38 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040}, 0x40000) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e20, @rand_addr=0x64010100}}, 0x24) [ 1059.777326] ieee802154 phy0 wpan0: encryption failed: -22 03:33:38 executing program 2: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:38 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aace", 0x7e}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:38 executing program 1: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589a", 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:38 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040}, 0x40000) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e20, @rand_addr=0x64010100}}, 0x24) 03:33:38 executing program 2: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1060.017600] ieee802154 phy0 wpan0: encryption failed: -22 03:33:38 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x40000) 03:33:38 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:38 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:38 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x40000) 03:33:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040}, 0x40000) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e20, @rand_addr=0x64010100}}, 0x24) 03:33:38 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x40000) [ 1060.271043] ieee802154 phy0 wpan0: encryption failed: -22 03:33:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, 0x0, 0x4010) 03:33:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d70, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:38 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x40000) 03:33:38 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040}, 0x40000) 03:33:38 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x40000) 03:33:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, 0x0, 0x4010) 03:33:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1060.521595] ieee802154 phy0 wpan0: encryption failed: -22 03:33:39 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:39 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x40000) 03:33:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) 03:33:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, 0x0, 0x4010) 03:33:39 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1060.716297] ieee802154 phy0 wpan0: encryption failed: -22 03:33:39 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:39 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd24", 0x80}}, 0x40000) 03:33:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) 03:33:39 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={0x0, 0x0, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:39 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:39 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd24", 0x80}}, 0x0) 03:33:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 03:33:39 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={0x0, 0x0, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:39 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) 03:33:39 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:39 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={0x0, 0x0, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:39 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) [ 1061.253822] ieee802154 phy0 wpan0: encryption failed: -22 03:33:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:39 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1061.371380] ieee802154 phy0 wpan0: encryption failed: -22 03:33:39 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) 03:33:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140), 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:39 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1061.413612] ieee802154 phy0 wpan0: encryption failed: -22 03:33:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:39 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140), 0xc, 0x0}, 0x4010) 03:33:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1061.505506] ieee802154 phy0 wpan0: encryption failed: -22 03:33:40 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) 03:33:40 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1061.571734] ieee802154 phy0 wpan0: encryption failed: -22 03:33:40 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140), 0xc, 0x0}, 0x4010) 03:33:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) [ 1061.667311] ieee802154 phy0 wpan0: encryption failed: -22 [ 1061.685372] ieee802154 phy0 wpan0: encryption failed: -22 03:33:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:40 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140), 0xc, 0x0}, 0x4010) 03:33:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) [ 1061.800915] ieee802154 phy0 wpan0: encryption failed: -22 [ 1061.812099] ieee802154 phy0 wpan0: encryption failed: -22 03:33:40 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140), 0xc, &(0x7f0000005580)={0x0}}, 0x4010) 03:33:40 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) [ 1061.942704] ieee802154 phy0 wpan0: encryption failed: -22 03:33:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140), 0xc, &(0x7f0000005580)={0x0}}, 0x4010) 03:33:40 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1062.015072] ieee802154 phy0 wpan0: encryption failed: -22 03:33:40 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) 03:33:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a3440", 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:40 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) [ 1062.116478] ieee802154 phy0 wpan0: encryption failed: -22 03:33:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140), 0xc, &(0x7f0000005580)={0x0}}, 0x4010) 03:33:40 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5", 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1062.214731] ieee802154 phy0 wpan0: encryption failed: -22 03:33:40 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) 03:33:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140), 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) 03:33:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40202, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1062.309154] ieee802154 phy0 wpan0: encryption failed: -22 03:33:40 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) 03:33:40 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X', 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1062.379188] ieee802154 phy0 wpan0: encryption failed: -22 03:33:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x288, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:40 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:40 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) 03:33:40 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) 03:33:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0xa) [ 1062.484149] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) [ 1062.530000] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X', 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) 03:33:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff7fff81, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:41 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000180)={0x0, [0x4, 0xffffff44]}, 0x10) [ 1062.627570] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) 03:33:41 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X', 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000180)={0x0, [0x4]}, 0x10) [ 1062.691658] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f110836", 0x16}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:41 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1062.767341] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1ef", 0x21}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000180), 0x10) [ 1062.815935] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 3: setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) 03:33:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1a7, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1062.858446] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000180), 0x10) 03:33:41 executing program 3: setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) 03:33:41 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X', 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1062.925539] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1062.985604] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 03:33:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 3: setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) [ 1063.046359] ieee802154 phy0 wpan0: encryption failed: -22 [ 1063.073029] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140), 0x9, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x4010) 03:33:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1063.132568] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) 03:33:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) [ 1063.233065] ieee802154 phy0 wpan0: encryption failed: -22 [ 1063.251873] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) 03:33:41 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1063.288343] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751b", 0xb}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) [ 1063.370632] ieee802154 phy0 wpan0: encryption failed: -22 [ 1063.390516] ieee802154 phy0 wpan0: encryption failed: -22 03:33:41 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000180)={0x6, [0x4, 0xffffff44]}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) 03:33:41 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) 03:33:41 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa", 0x12}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1063.435004] ieee802154 phy0 wpan0: encryption failed: -22 03:33:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x40000) 03:33:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1063.530035] ieee802154 phy0 wpan0: encryption failed: -22 03:33:42 executing program 0: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa5f1108360ef503dce40a3fede2d1efdc39dca6f4fac5589a34409962e1a09f8334de5d2806c5a51df1d7ffc02da5770da81a975e77855030148c2b74a49c3470ac75ddb8589aef6b0e08372aea965686e90f27b454ac03429b62403f29e4fbbfe732dc1500d796e466e2aacedd", 0x7f}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada530ba4ff751bde988ed04b16fa", 0x12}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1063.593763] ieee802154 phy0 wpan0: encryption failed: -22 03:33:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) 03:33:42 executing program 0: ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000000)={0x0, 0x0, 0x5}) syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x28080) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400)='l2tp\x00', r0) 03:33:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x6000, 0xabf, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x3ff800000000000, 0x5, &(0x7f0000000280)=[{&(0x7f0000000080)="2e373ecabeea1f3f3424bf93ca472e04d1d7214f9da14e9e9a2ecabbef070621cb6a377c0a85e75a9e14bdc9c3b6ccfb998fc641032dee8bb8920f74f42780c7252a00d5a37a254fef82f0b386cf15640f6a514867894c0b74b2d7dc42925f1ce61e39c459e5a609328f971fd7", 0x6d, 0x3}, {&(0x7f0000000100)="b2c88ddfeacd0fab6cde0ef6adc76af6c24fc9bc78cdb99e1b154ddb366169085de95e56a8dae7082874b054cd52fdca3cc63ee021b59bd224e90a5e1e00634e9b59acd4b4acea903f6dccac8df92562f3c5f2931e718971312e331984bd07f48a83efd8ae3d2b45aa3546d5d4b07d1120e07d8cc9705639", 0x78, 0x8}, {&(0x7f0000000180)="764691bdbdfba73b0620ecaede4068155cb10da0f23b62f6bef92e714d0a83f211e693311c037d9f72c46ee083875754a2379d224a5aa1001a6a6eb0", 0x3c, 0x81}, {&(0x7f00000001c0)="9aca6ddb52f0cad35bcc7d0c0f6b953983649523ffce098f", 0x18, 0x1}, {&(0x7f0000000200)="7024847db5041e2b7d3d15e26672a7ed0544d16bc74bb33b9cfe3808d3b561993de9fa878033113f258d10950df8638f28a7c3c675dde7b9efe5399a1d034f15eec70700be0bd372f60e3cca30e31ffb58d193d7b0f4955ebcc040f8c8a945", 0x5f, 0x173c}], 0xc20800, &(0x7f0000000440)=ANY=[@ANYBLOB='session=0x00000000000007ff,dir_umask=00000000000000000000005,umask=000000000000000011,uid=', @ANYRESHEX=r1, @ANYBLOB=',quiet,file_umask=00000000000000000000001,file_umask=00000000000000000000001,file_umask=00000000000000000000152,audit,\x00']) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) 03:33:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1063.682422] ieee802154 phy0 wpan0: encryption failed: -22 [ 1063.688363] ieee802154 phy0 wpan0: encryption failed: -22 03:33:42 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 0: ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000000)={0x0, 0x0, 0x5}) syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x28080) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400)='l2tp\x00', r0) 03:33:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) [ 1063.771764] ieee802154 phy0 wpan0: encryption failed: -22 03:33:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x6000, 0xabf, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x3ff800000000000, 0x5, &(0x7f0000000280)=[{&(0x7f0000000080)="2e373ecabeea1f3f3424bf93ca472e04d1d7214f9da14e9e9a2ecabbef070621cb6a377c0a85e75a9e14bdc9c3b6ccfb998fc641032dee8bb8920f74f42780c7252a00d5a37a254fef82f0b386cf15640f6a514867894c0b74b2d7dc42925f1ce61e39c459e5a609328f971fd7", 0x6d, 0x3}, {&(0x7f0000000100)="b2c88ddfeacd0fab6cde0ef6adc76af6c24fc9bc78cdb99e1b154ddb366169085de95e56a8dae7082874b054cd52fdca3cc63ee021b59bd224e90a5e1e00634e9b59acd4b4acea903f6dccac8df92562f3c5f2931e718971312e331984bd07f48a83efd8ae3d2b45aa3546d5d4b07d1120e07d8cc9705639", 0x78, 0x8}, {&(0x7f0000000180)="764691bdbdfba73b0620ecaede4068155cb10da0f23b62f6bef92e714d0a83f211e693311c037d9f72c46ee083875754a2379d224a5aa1001a6a6eb0", 0x3c, 0x81}, {&(0x7f00000001c0)="9aca6ddb52f0cad35bcc7d0c0f6b953983649523ffce098f", 0x18, 0x1}, {&(0x7f0000000200)="7024847db5041e2b7d3d15e26672a7ed0544d16bc74bb33b9cfe3808d3b561993de9fa878033113f258d10950df8638f28a7c3c675dde7b9efe5399a1d034f15eec70700be0bd372f60e3cca30e31ffb58d193d7b0f4955ebcc040f8c8a945", 0x5f, 0x173c}], 0xc20800, &(0x7f0000000440)=ANY=[@ANYBLOB='session=0x00000000000007ff,dir_umask=00000000000000000000005,umask=000000000000000011,uid=', @ANYRESHEX=r1, @ANYBLOB=',quiet,file_umask=00000000000000000000001,file_umask=00000000000000000000001,file_umask=00000000000000000000152,audit,\x00']) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) 03:33:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 0: ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000000)={0x0, 0x0, 0x5}) syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x28080) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400)='l2tp\x00', r0) 03:33:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) 03:33:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) [ 1063.951685] ieee802154 phy0 wpan0: encryption failed: -22 [ 1063.961644] ieee802154 phy0 wpan0: encryption failed: -22 03:33:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bcada53", 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x6000, 0xabf, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x3ff800000000000, 0x5, &(0x7f0000000280)=[{&(0x7f0000000080)="2e373ecabeea1f3f3424bf93ca472e04d1d7214f9da14e9e9a2ecabbef070621cb6a377c0a85e75a9e14bdc9c3b6ccfb998fc641032dee8bb8920f74f42780c7252a00d5a37a254fef82f0b386cf15640f6a514867894c0b74b2d7dc42925f1ce61e39c459e5a609328f971fd7", 0x6d, 0x3}, {&(0x7f0000000100)="b2c88ddfeacd0fab6cde0ef6adc76af6c24fc9bc78cdb99e1b154ddb366169085de95e56a8dae7082874b054cd52fdca3cc63ee021b59bd224e90a5e1e00634e9b59acd4b4acea903f6dccac8df92562f3c5f2931e718971312e331984bd07f48a83efd8ae3d2b45aa3546d5d4b07d1120e07d8cc9705639", 0x78, 0x8}, {&(0x7f0000000180)="764691bdbdfba73b0620ecaede4068155cb10da0f23b62f6bef92e714d0a83f211e693311c037d9f72c46ee083875754a2379d224a5aa1001a6a6eb0", 0x3c, 0x81}, {&(0x7f00000001c0)="9aca6ddb52f0cad35bcc7d0c0f6b953983649523ffce098f", 0x18, 0x1}, {&(0x7f0000000200)="7024847db5041e2b7d3d15e26672a7ed0544d16bc74bb33b9cfe3808d3b561993de9fa878033113f258d10950df8638f28a7c3c675dde7b9efe5399a1d034f15eec70700be0bd372f60e3cca30e31ffb58d193d7b0f4955ebcc040f8c8a945", 0x5f, 0x173c}], 0xc20800, &(0x7f0000000440)=ANY=[@ANYBLOB='session=0x00000000000007ff,dir_umask=00000000000000000000005,umask=000000000000000011,uid=', @ANYRESHEX=r1, @ANYBLOB=',quiet,file_umask=00000000000000000000001,file_umask=00000000000000000000001,file_umask=00000000000000000000152,audit,\x00']) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) 03:33:42 executing program 0: ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000000)={0x0, 0x0, 0x5}) syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x28080) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) 03:33:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0x541b, 0x0) 03:33:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) [ 1064.109933] ieee802154 phy0 wpan0: encryption failed: -22 [ 1064.122135] ieee802154 phy0 wpan0: encryption failed: -22 03:33:42 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0x541b, 0x0) 03:33:42 executing program 0: ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000000)={0x0, 0x0, 0x5}) syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x28080) socket$nl_generic(0x10, 0x3, 0x10) 03:33:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X', 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x6000, 0xabf, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x3ff800000000000, 0x5, &(0x7f0000000280)=[{&(0x7f0000000080)="2e373ecabeea1f3f3424bf93ca472e04d1d7214f9da14e9e9a2ecabbef070621cb6a377c0a85e75a9e14bdc9c3b6ccfb998fc641032dee8bb8920f74f42780c7252a00d5a37a254fef82f0b386cf15640f6a514867894c0b74b2d7dc42925f1ce61e39c459e5a609328f971fd7", 0x6d, 0x3}, {&(0x7f0000000100)="b2c88ddfeacd0fab6cde0ef6adc76af6c24fc9bc78cdb99e1b154ddb366169085de95e56a8dae7082874b054cd52fdca3cc63ee021b59bd224e90a5e1e00634e9b59acd4b4acea903f6dccac8df92562f3c5f2931e718971312e331984bd07f48a83efd8ae3d2b45aa3546d5d4b07d1120e07d8cc9705639", 0x78, 0x8}, {&(0x7f0000000180)="764691bdbdfba73b0620ecaede4068155cb10da0f23b62f6bef92e714d0a83f211e693311c037d9f72c46ee083875754a2379d224a5aa1001a6a6eb0", 0x3c, 0x81}, {&(0x7f00000001c0)="9aca6ddb52f0cad35bcc7d0c0f6b953983649523ffce098f", 0x18, 0x1}, {&(0x7f0000000200)="7024847db5041e2b7d3d15e26672a7ed0544d16bc74bb33b9cfe3808d3b561993de9fa878033113f258d10950df8638f28a7c3c675dde7b9efe5399a1d034f15eec70700be0bd372f60e3cca30e31ffb58d193d7b0f4955ebcc040f8c8a945", 0x5f, 0x173c}], 0xc20800, &(0x7f0000000440)=ANY=[@ANYBLOB='session=0x00000000000007ff,dir_umask=00000000000000000000005,umask=000000000000000011,uid=', @ANYRESHEX=r1, @ANYBLOB=',quiet,file_umask=00000000000000000000001,file_umask=00000000000000000000001,file_umask=00000000000000000000152,audit,\x00']) [ 1064.262273] ieee802154 phy0 wpan0: encryption failed: -22 [ 1064.300681] ieee802154 phy0 wpan0: encryption failed: -22 03:33:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X', 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0x541b, 0x0) 03:33:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x6000, 0xabf, &(0x7f0000000340)) 03:33:42 executing program 0: ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000000)={0x0, 0x0, 0x5}) syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x28080) 03:33:42 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) [ 1064.420813] ieee802154 phy0 wpan0: encryption failed: -22 03:33:42 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) 03:33:42 executing program 0: syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x28080) [ 1064.467588] ieee802154 phy0 wpan0: encryption failed: -22 03:33:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X', 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:43 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x6000, 0xabf, &(0x7f0000000340)) 03:33:43 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:43 executing program 0: syz_open_dev$ndb(0x0, 0x0, 0x28080) 03:33:43 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) [ 1064.608340] ieee802154 phy0 wpan0: encryption failed: -22 [ 1064.624689] ieee802154 phy0 wpan0: encryption failed: -22 03:33:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="585f7bca", 0x4}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:43 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x6000, 0xabf, &(0x7f0000000340)) 03:33:43 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) 03:33:43 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:43 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:43 executing program 0: syz_open_dev$ndb(0x0, 0x0, 0x28080) [ 1064.738237] ieee802154 phy0 wpan0: encryption failed: -22 03:33:43 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) 03:33:43 executing program 3: statx(0xffffffffffffff9c, 0x0, 0x6000, 0xabf, &(0x7f0000000340)) [ 1064.790679] ieee802154 phy0 wpan0: encryption failed: -22 03:33:43 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:43 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:43 executing program 3: statx(0xffffffffffffff9c, 0x0, 0x0, 0xabf, &(0x7f0000000340)) 03:33:43 executing program 0: syz_open_dev$ndb(0x0, 0x0, 0x28080) 03:33:43 executing program 4: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0x541b, 0x0) [ 1064.963049] ieee802154 phy0 wpan0: encryption failed: -22 [ 1064.975000] ieee802154 phy0 wpan0: encryption failed: -22 03:33:43 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:43 executing program 3: statx(0xffffffffffffff9c, 0x0, 0x0, 0xabf, &(0x7f0000000340)) 03:33:43 executing program 0: syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x0) 03:33:43 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}}, 0x40000) 03:33:43 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:43 executing program 4: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0x541b, 0x0) 03:33:43 executing program 3: statx(0xffffffffffffff9c, 0x0, 0x0, 0xabf, &(0x7f0000000340)) 03:33:43 executing program 0: syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x0) [ 1065.127322] ieee802154 phy0 wpan0: encryption failed: -22 [ 1065.165556] ieee802154 phy0 wpan0: encryption failed: -22 03:33:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:43 executing program 4: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0x541b, 0x0) 03:33:43 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}}, 0x0) 03:33:43 executing program 3: statx(0xffffffffffffff9c, 0x0, 0x6000, 0x0, &(0x7f0000000340)) 03:33:43 executing program 0: syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x0) 03:33:43 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) [ 1065.292510] ieee802154 phy0 wpan0: encryption failed: -22 03:33:43 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}}, 0x40000) 03:33:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1065.348054] ieee802154 phy0 wpan0: encryption failed: -22 03:33:43 executing program 5: socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:43 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:43 executing program 3: statx(0xffffffffffffff9c, 0x0, 0x6000, 0x0, 0x0) 03:33:43 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0x541b, 0x0) [ 1065.469736] ieee802154 phy0 wpan0: encryption failed: -22 [ 1065.480842] ieee802154 phy0 wpan0: encryption failed: -22 [ 1065.495820] ieee802154 phy0 wpan0: encryption failed: -22 03:33:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:44 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}}, 0x40000) 03:33:44 executing program 5: socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:44 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:44 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) [ 1065.612948] ieee802154 phy0 wpan0: encryption failed: -22 [ 1065.618764] ieee802154 phy0 wpan0: encryption failed: -22 [ 1065.650110] ieee802154 phy0 wpan0: encryption failed: -22 03:33:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='errors=']) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r2 = getuid() r3 = syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r1}}, {@euid_eq={'euid', 0x3d, r2}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) syz_mount_image$reiserfs(&(0x7f00000026c0)='reiserfs\x00', &(0x7f0000002700)='./file0\x00', 0x9, 0x5, &(0x7f0000002b00)=[{&(0x7f0000002740)="670b1c912d6fda81b1f51d1554b43aca70f76b6fa84b68878dcc44b99567d1a570f71dfc7a03020e5e6aa7bdcf09ab5ec3505215f08d2271c4057513dfed384155ee21ed02b67365a8816ea2bf31d6bf73db01db3e0725bdb13ed96904c96289cbf19b", 0x63, 0x7}, {&(0x7f00000027c0)="1ea9039d61b81509d298af0e4cf2ca1a0f1a0af0dafc3087c1d4c29798d218db7e5b831ddf24077b3b3fd7d8895b33483022390bf8e4585072dbc810a51e0ac0afd304728646ca2f24adb1904aaefb547c1061a1a2acc02c0bac9bcfc3be7097b356ae9346a5f258f2ddd57c7daf8a3c2660b19565ab353034e7a0e0c7e7548d93cbfdd18bcda8d9b424def230d1e8d14ff17f7eba44b371a2b0ced6661d41efd831dd451957644d19d49aa1bf74dc462ded31c04c08b9656d4cf88fa4f4c782b6bd3ab8226d1a9585ec1d02b31df2310f5cda5623515f3160", 0xd9, 0x2}, {&(0x7f00000028c0)="e1e66f04ed0f9b0be366568700a163cf4f1dfa4048313b8dd61194a962e299a7d5b5541456059f41d5e8d52051db282374005a5dbc85e10421f41a9b67dde1890d9f6e10bfaa53386591886f431bf16b39b9d665b14532f8831dfb7e7ff50a1fb0e75a5710f831a7cd9b7d12fb896ed282f4aec1d59290c4467a57e040ce95fa8b02ace7784ecf415e00057fe153d57abd9ccf7f9662c41abee4c4af48ced1bf7bdd741ac43cbcf0d9baac32396cea4214d342112ce2e452bc250a54793ea7412e1b2915b2a633a91833ec258dfd04f58d9fdd2716b39718", 0xd8, 0xcd92000000000000}, {&(0x7f00000029c0)="ee824f6e95", 0x5, 0x5}, {&(0x7f0000002a00)="3222ea85dd7431a11237b1470398316b489b924b39e6e0991007c5748e2fe5f3e04af967551ab79c11d53009b29781e4a4d2350bb928a6fc7f5cfd31efafdd616a1c26b9c6fcbd3e50ebd82fb045d0e0440a06bb80d5331a11823c0d2be2569cec8ca651159975266747fcd4ec9c5f0ef8ebad24242133d3c224213c3133e488b5b0bde1dbe9cd94b492b2522c638c7b85911079eb9c625cf688a3d20ae8a51596f387e3a9d5901520979e52fa2e54d540baafa39ddeff5995bc4d0b7b1602e1b5e86dfe1d8d2ecba2cb5150442d99151845c958f71208ff", 0xd8}], 0x80082, &(0x7f0000002b80)={[{@barrier_flush='barrier=flush'}, {@resize={'resize', 0x3d, 0x9}}, {@notail='notail'}], [{@fsname={'fsname', 0x3d, '+'}}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r7 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000002bc0)={0x0, 0x7fffffff, 0x1f, 0x1}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r7, 0xc400941d, &(0x7f0000002fc0)={r8, 0x20, 0x100000001, 0x1}) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r10, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) ioctl$BTRFS_IOC_SCRUB(r10, 0xc400941b, &(0x7f00000033c0)={r9, 0x1, 0x7ff, 0x1}) r11 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r6}}, {@euid_eq={'euid', 0x3d, r11}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1a9, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="5a43571f1d25441b8d3524507078eb0ba2f16fcc014789f544f0c7426baacb53af35", 0x22}], 0x0, &(0x7f0000000180)={[{@quiet='quiet'}, {@session={'session', 0x3d, 0x8}}, {@creator={'creator', 0x3d, "bdcfcef9"}}, {@uid={'uid', 0x3d, r2}}, {@file_umask={'file_umask', 0x3d, 0x67}}, {@file_umask={'file_umask', 0x3d, 0x7fffffff}}, {@gid={'gid', 0x3d, 0xee01}}, {@file_umask={'file_umask'}}, {@uid={'uid', 0x3d, r5}}], [{@euid_gt={'euid>', r6}}, {@smackfshat={'smackfshat', 0x3d, 'reiserfs\x00'}}, {@seclabel='seclabel'}, {@hash='hash'}]}) 03:33:44 executing program 5: socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) [ 1065.683064] ieee802154 phy0 wpan0: encryption failed: -22 03:33:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r1, &(0x7f0000002080)={0x20, 0x0, r2, {0x4, 0x4, 0x1}}, 0x20) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) 03:33:44 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) 03:33:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004004}, 0x8040) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x5421, 0x0) [ 1065.755056] REISERFS warning (device loop4): super-6506 reiserfs_getopt: empty argument for "errors" [ 1065.755056] [ 1065.793319] ieee802154 phy0 wpan0: encryption failed: -22 03:33:44 executing program 2: r0 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='/dev/audio#\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x4, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x39, 0x4, 0x6, 0xec, 0x0, 0x5, 0x404, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x908, 0x1}, 0x40008, 0x7, 0xea, 0x4, 0x5, 0x5, 0x7ff}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x6) read$char_usb(r2, &(0x7f0000000140)=""/201, 0xc9) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) 03:33:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_', 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:33:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x8004, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) [ 1065.868080] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:44 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) 03:33:44 executing program 2: r0 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='/dev/audio#\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x4, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x39, 0x4, 0x6, 0xec, 0x0, 0x5, 0x404, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x908, 0x1}, 0x40008, 0x7, 0xea, 0x4, 0x5, 0x5, 0x7ff}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x6) read$char_usb(r2, &(0x7f0000000140)=""/201, 0xc9) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) [ 1065.969311] ieee802154 phy0 wpan0: encryption failed: -22 [ 1066.060473] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:44 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x7ff, &(0x7f0000000040)) r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) statx(r0, &(0x7f0000000180)='./file0\x00', 0x2000, 0x20, &(0x7f00000001c0)) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0xd3be) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000140)) 03:33:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0000f8ae0deb1e1c8bf200"], 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEV_REPLACE(r3, 0xca289435, &(0x7f0000000240)={0x2, 0x3, @start={0x0, 0x1, "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", "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"}, [0x0, 0x1, 0x8f0, 0x2, 0x1, 0x1, 0x13, 0x9, 0x1, 0x9, 0x2, 0x2, 0xfffffffeffffffff, 0x5, 0x2ff8, 0x1, 0x10000, 0x3, 0x9, 0x4, 0x400, 0x3, 0x1, 0x100000000, 0x80, 0x1, 0x3, 0x0, 0x3, 0xe43, 0x96, 0x3, 0x3, 0xbe0, 0x8000, 0x100000000, 0x1, 0x8ac1, 0x5, 0x7fff, 0x10001, 0xfffffffffffffffa, 0x91d, 0x0, 0x100000001, 0x20, 0x3, 0x8, 0x10000, 0x80cd, 0x5, 0x7, 0x0, 0xef, 0x221651ed, 0x2, 0x81, 0x6518831d, 0x4, 0x200, 0x9, 0x8, 0x80000000, 0x7]}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x4) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb0, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x840) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14, 0x0, 0x0, 0x4}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x5421, 0x0) 03:33:44 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) 03:33:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0x2) socket$rxrpc(0x21, 0x2, 0xa) 03:33:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}}, 0x40000) 03:33:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'/14], 0x14}}, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000003080)={{r3}, 0x0, 0x4, @unused=[0x3, 0x2, 0x100000000, 0x3], @devid=r2}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000003040)={0x10, 0xffffffffffffffda, r4}, 0x10) 03:33:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'/14], 0x14}}, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000003080)={{r3}, 0x0, 0x4, @unused=[0x3, 0x2, 0x100000000, 0x3], @devid=r2}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000003040)={0x10, 0xffffffffffffffda, r4}, 0x10) 03:33:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0xa) [ 1066.200344] ieee802154 phy0 wpan0: encryption failed: -22 03:33:44 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}]}, 0x24}, 0x1, 0x0, 0x0, 0x8044}, 0x4000000) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) inotify_init1(0x800) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000000, 0x5, &(0x7f0000000380)=[{&(0x7f0000000080)="f8723107bdf5a58c18193d1471199044df0182bd627082fff4c6d825b31c", 0x1e}, {&(0x7f00000000c0)="b5ee899a7461e4217684ddbf27b85444f28a9b6758a77889ed3d6733b86ea03f914aaaee3fefb876bf1a1119c3113e9f2f03d1a0edff857dd2ebcdf9fc16be43333e545bce8f50d22f147f8b55e132586e10fb880010c36e0433c7bf010bcb59f3a8286f0ade85290181997db20736e21e7ae20c2b576505601ecf25b76b024fced901c1f809eed48b0c7ba24af8d3f8daf29f4b76175a9e1a8362c9cb8ac3a8ea2b7ceeff12bcb60812c3296f7acc33fae6c266384763fcc6ddb696471e34737e", 0xc1, 0x6abd}, {&(0x7f00000001c0)="095e9f00311345b68875cdcd8716d72614e596819209240b3fcbe01dfb5d9b36440cd04e2444e1b51a4f1179d8e5d3a252b9dcb388810dc5", 0x38, 0x8}, {&(0x7f0000000200)="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", 0xfd, 0x7}, {&(0x7f0000000300)="0c5050228657817080334a064fe0e4983e21f81f258d18da670b76d42d5e9de9e016bb5f1e60416db55c5d41dc5b37943269c066ab60e73ec9c742fb279b054e09e42ead113f4934ef5271d33cda678ec2a77c7aafa05c199d3e41217e1921ab5dd3105e510ff6c95c94508e872cb4edaa", 0x71, 0xffffffffffffff01}], 0xc040, &(0x7f0000000400)={[{@resize_auto='resize=auto'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0xd7}}]}) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x200, 0x100) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) 03:33:44 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0xfffffffc, {0x2, 0x4e23, @multicast2}}, 0x24) 03:33:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800, 0x80, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>', r3}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)='X_{', 0x3}}, 0x0) 03:33:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0xa) 03:33:44 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0xfffffffc, {0x2, 0x0, @multicast2}}, 0x24) 03:33:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'/14], 0x14}}, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000003080)={{r3}, 0x0, 0x4, @unused=[0x3, 0x2, 0x100000000, 0x3], @devid=r2}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000003040)={0x10, 0xffffffffffffffda, r4}, 0x10) [ 1066.370502] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "dont_measure" [ 1066.400166] ieee802154 phy0 wpan0: encryption failed: -22 [ 1066.406022] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f0000000380)={r6, 0x3, &(0x7f0000000280)=[0x96b5, 0x4, 0x41], &(0x7f00000002c0)=[0x6a, 0x10000, 0xb758, 0x8, 0x2, 0x9, 0x6, 0xf2], 0x15, 0x2, 0x8, &(0x7f0000000300)=[0x9, 0x7], &(0x7f0000000340)=[0x1, 0x4, 0x7, 0x1, 0x7]}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f00000000c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0x4, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYRES64, @ANYRESHEX=r4, @ANYBLOB="3dfbd252c2837f6c16ccc01b108767f14be679d7be229a659770616e354b17049a28f494a854a9fcbdfa73dc5581d8056d0932b8055144dc6fde89d4bde4ad63a86c00b70e7243c6a931c8c19ce44f4b68a94718f57926b31d4de30e657a7e727bc3a3127aa2e3cf8d8fdc487cd3c97393", @ANYRESHEX=r2, @ANYRES32=r0, @ANYRESDEC=r3, @ANYRES16=r2, @ANYRESHEX=r4, @ANYRES64=r1], 0x6c}, 0x1, 0x0, 0x0, 0x200408d0}, 0x8000) 03:33:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0xa) [ 1066.474291] 9pnet: Insufficient options for proto=fd 03:33:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x541b, 0x0) socket$rxrpc(0x21, 0x2, 0xa) 03:33:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'/14], 0x14}}, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000003080)={{r3}, 0x0, 0x4, @unused=[0x3, 0x2, 0x100000000, 0x3], @devid=r2}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000)={0x2020}, 0x2020) 03:33:45 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x2) clock_gettime(0x0, &(0x7f0000000040)) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd=0xffffffffffffffff, 0x6}, 0x7f}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x1000000, 0x7, 0x4, 0x1, 0xffffffff, {0x77359400}, {0x2, 0x0, 0x81, 0x8, 0x7, 0x1, "05e3c5e9"}, 0xff, 0x4, @fd=r1, 0x4000007}) 03:33:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800, 0x80, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>', r3}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f0000000380)={r6, 0x3, &(0x7f0000000280)=[0x96b5, 0x4, 0x41], &(0x7f00000002c0)=[0x6a, 0x10000, 0xb758, 0x8, 0x2, 0x9, 0x6, 0xf2], 0x15, 0x2, 0x8, &(0x7f0000000300)=[0x9, 0x7], &(0x7f0000000340)=[0x1, 0x4, 0x7, 0x1, 0x7]}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f00000000c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0x4, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYRES64, @ANYRESHEX=r4, @ANYBLOB="3dfbd252c2837f6c16ccc01b108767f14be679d7be229a659770616e354b17049a28f494a854a9fcbdfa73dc5581d8056d0932b8055144dc6fde89d4bde4ad63a86c00b70e7243c6a931c8c19ce44f4b68a94718f57926b31d4de30e657a7e727bc3a3127aa2e3cf8d8fdc487cd3c97393", @ANYRESHEX=r2, @ANYRES32=r0, @ANYRESDEC=r3, @ANYRES16=r2, @ANYRESHEX=r4, @ANYRES64=r1], 0x6c}, 0x1, 0x0, 0x0, 0x200408d0}, 0x8000) 03:33:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'/14], 0x14}}, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000003080)={{r3}, 0x0, 0x4, @unused=[0x3, 0x2, 0x100000000, 0x3], @devid=r2}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) 03:33:45 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0x2) socket$rxrpc(0x21, 0x2, 0xa) 03:33:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'/14], 0x14}}, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000003080)={{r3}, 0x0, 0x4, @unused=[0x3, 0x2, 0x100000000, 0x3], @devid=r2}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000)={0x2020}, 0x2020) 03:33:45 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x2) clock_gettime(0x0, &(0x7f0000000040)) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd=0xffffffffffffffff, 0x6}, 0x7f}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x1000000, 0x7, 0x4, 0x1, 0xffffffff, {0x77359400}, {0x2, 0x0, 0x81, 0x8, 0x7, 0x1, "05e3c5e9"}, 0xff, 0x4, @fd=r1, 0x4000007}) 03:33:45 executing program 0: socket$rxrpc(0x21, 0x2, 0x2) socket$rxrpc(0x21, 0x2, 0xa) 03:33:45 executing program 5: semget$private(0x0, 0x2, 0x40) socket$nl_generic(0x10, 0x3, 0x10) semget$private(0x0, 0x0, 0x86) [ 1066.719927] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f0000000380)={r6, 0x3, &(0x7f0000000280)=[0x96b5, 0x4, 0x41], &(0x7f00000002c0)=[0x6a, 0x10000, 0xb758, 0x8, 0x2, 0x9, 0x6, 0xf2], 0x15, 0x2, 0x8, &(0x7f0000000300)=[0x9, 0x7], &(0x7f0000000340)=[0x1, 0x4, 0x7, 0x1, 0x7]}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f00000000c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0x4, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYRES64, @ANYRESHEX=r4, @ANYBLOB="3dfbd252c2837f6c16ccc01b108767f14be679d7be229a659770616e354b17049a28f494a854a9fcbdfa73dc5581d8056d0932b8055144dc6fde89d4bde4ad63a86c00b70e7243c6a931c8c19ce44f4b68a94718f57926b31d4de30e657a7e727bc3a3127aa2e3cf8d8fdc487cd3c97393", @ANYRESHEX=r2, @ANYRES32=r0, @ANYRESDEC=r3, @ANYRES16=r2, @ANYRESHEX=r4, @ANYRES64=r1], 0x6c}, 0x1, 0x0, 0x0, 0x200408d0}, 0x8000) 03:33:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'/14], 0x14}}, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000003080)={{r3}, 0x0, 0x4, @unused=[0x3, 0x2, 0x100000000, 0x3], @devid=r2}) 03:33:45 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x2) clock_gettime(0x0, &(0x7f0000000040)) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd=0xffffffffffffffff, 0x6}, 0x7f}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x1000000, 0x7, 0x4, 0x1, 0xffffffff, {0x77359400}, {0x2, 0x0, 0x81, 0x8, 0x7, 0x1, "05e3c5e9"}, 0xff, 0x4, @fd=r1, 0x4000007}) [ 1066.803506] 9pnet: Insufficient options for proto=fd 03:33:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800, 0x80, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>', r3}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:45 executing program 0: socket$rxrpc(0x21, 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0xa) 03:33:45 executing program 5: semget$private(0x0, 0x2, 0x40) socket$nl_generic(0x10, 0x3, 0x10) semget$private(0x0, 0x0, 0x86) 03:33:45 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'/14], 0x14}}, 0x0) 03:33:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f0000000380)={r5, 0x3, &(0x7f0000000280)=[0x96b5, 0x4, 0x41], &(0x7f00000002c0)=[0x6a, 0x10000, 0xb758, 0x8, 0x2, 0x9, 0x6, 0xf2], 0x15, 0x2, 0x8, &(0x7f0000000300)=[0x9, 0x7], &(0x7f0000000340)=[0x1, 0x4, 0x7, 0x1, 0x7]}) 03:33:45 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x2) clock_gettime(0x0, &(0x7f0000000040)) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) [ 1066.978761] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:45 executing program 0: socket$rxrpc(0x21, 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0xa) 03:33:45 executing program 5: semget$private(0x0, 0x2, 0x40) socket$nl_generic(0x10, 0x3, 0x10) semget$private(0x0, 0x0, 0x86) [ 1067.031618] 9pnet: Insufficient options for proto=fd 03:33:45 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) socket$nl_generic(0x10, 0x3, 0x10) 03:33:45 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)) 03:33:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800, 0x80, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) r2 = getuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>', r2}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:45 executing program 0: socket$rxrpc(0x21, 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0xa) 03:33:45 executing program 5: semget$private(0x0, 0x2, 0x40) socket$nl_generic(0x10, 0x3, 0x10) 03:33:45 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:45 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) 03:33:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) 03:33:45 executing program 0: socket$rxrpc(0x21, 0x2, 0x2) socket$rxrpc(0x21, 0x2, 0x0) 03:33:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800, 0x80, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) r2 = getuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>', r2}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:45 executing program 5: semget$private(0x0, 0x2, 0x40) 03:33:45 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:45 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) 03:33:45 executing program 0: socket$rxrpc(0x21, 0x2, 0x2) socket$rxrpc(0x21, 0x2, 0x0) 03:33:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800, 0x80, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) r2 = getuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>', r2}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) 03:33:45 executing program 5: semget$private(0x0, 0x0, 0x40) 03:33:45 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:46 executing program 0: socket$rxrpc(0x21, 0x2, 0x2) socket$rxrpc(0x21, 0x2, 0x0) 03:33:46 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) 03:33:46 executing program 5: semget$private(0x0, 0x0, 0x40) 03:33:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800, 0x80, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r2}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) 03:33:46 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:46 executing program 0: socket$rxrpc(0x21, 0x2, 0x2) socket$rxrpc(0x21, 0x2, 0x0) 03:33:46 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) 03:33:46 executing program 5: semget$private(0x0, 0x0, 0x40) 03:33:46 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) [ 1067.782604] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:46 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) [ 1067.839959] 9pnet: Insufficient options for proto=fd 03:33:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800, 0x80, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) 03:33:46 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:46 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) 03:33:46 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:46 executing program 5: semget$private(0x0, 0x2, 0x0) 03:33:46 executing program 2: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) 03:33:46 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) [ 1068.031069] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) 03:33:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) 03:33:46 executing program 0: semget$private(0x0, 0x2, 0x40) socket$nl_generic(0x10, 0x3, 0x10) [ 1068.088409] 9pnet: Insufficient options for proto=fd 03:33:46 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:46 executing program 2: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) 03:33:46 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:46 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000700)={0x3, 0xc90, @status={[0x1, 0x1, 0x800, 0xfff, 0x2]}, [0x0, 0x8, 0x51, 0x1, 0x6, 0x40b, 0x3, 0x32b09c47, 0x9d3, 0x8, 0x2, 0x5, 0x101, 0x3, 0x1f, 0x5, 0x40, 0x9, 0xfff, 0x6, 0x0, 0x2, 0x5, 0x731a3b37, 0x10001, 0xffff, 0x5, 0x401, 0x7f, 0x1f, 0x80000000000, 0x401, 0x5, 0x1000, 0xffffffffffffff00, 0x101, 0xffffffff, 0x5, 0x100, 0x4, 0x6, 0x100000001, 0x200, 0x1, 0x4, 0x6, 0x1, 0xce5, 0x8, 0x1000, 0x3, 0x6, 0x7fff, 0x80000001, 0xff, 0xfffffffffffffffc, 0x3, 0x4, 0x4, 0x1ff, 0x0, 0x81, 0x100000001]}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x6, 0xb, 0x4, 0x8, 0x1f, {r1, r2/1000+60000}, {0x4, 0x1, 0x2, 0x9, 0x7f, 0x95, "dfba0da3"}, 0x62, 0x1, @fd, 0x8}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f00000002c0)={0x1f8, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x9c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x83, 0x5, "e3438ab3c1b7b2d95559c64eb76d86b3373bb9ee97f5b36587e34b90c20d12d78731abbdbe37a2cb5163e5fe5a4737e398c13b4d440af08296f640e08312c389b25214644d16e882807bf8cac66ffb22fca1d55929886780f97bbff613170286bf3b5d005cafc0fab5f1c1dcab6e4f5c1234283bddd7f8c40993fcf5daece4"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfda}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x148, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x130, 0x3, 0x0, 0x1, [{0x4}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!-\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '@}\'@@[[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xe, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$+*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, ')](%.},,#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '+#:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-\x9a\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x8c:\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xac}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x1f8}}, 0x80d1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x5421, 0x0) 03:33:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) 03:33:46 executing program 2: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000000)={0x0, "a323795685fe91e70b13bd4b52c77094"}) 03:33:46 executing program 0: semget$private(0x0, 0x2, 0x40) socket$nl_generic(0x10, 0x3, 0x10) [ 1068.305496] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:46 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) [ 1068.378603] 9pnet: Insufficient options for proto=fd [ 1068.397593] hfs: unable to parse mount options 03:33:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:46 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) 03:33:46 executing program 0: semget$private(0x0, 0x2, 0x40) socket$nl_generic(0x10, 0x3, 0x10) 03:33:46 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:47 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000700)={0x3, 0xc90, @status={[0x1, 0x1, 0x800, 0xfff, 0x2]}, [0x0, 0x8, 0x51, 0x1, 0x6, 0x40b, 0x3, 0x32b09c47, 0x9d3, 0x8, 0x2, 0x5, 0x101, 0x3, 0x1f, 0x5, 0x40, 0x9, 0xfff, 0x6, 0x0, 0x2, 0x5, 0x731a3b37, 0x10001, 0xffff, 0x5, 0x401, 0x7f, 0x1f, 0x80000000000, 0x401, 0x5, 0x1000, 0xffffffffffffff00, 0x101, 0xffffffff, 0x5, 0x100, 0x4, 0x6, 0x100000001, 0x200, 0x1, 0x4, 0x6, 0x1, 0xce5, 0x8, 0x1000, 0x3, 0x6, 0x7fff, 0x80000001, 0xff, 0xfffffffffffffffc, 0x3, 0x4, 0x4, 0x1ff, 0x0, 0x81, 0x100000001]}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x6, 0xb, 0x4, 0x8, 0x1f, {r1, r2/1000+60000}, {0x4, 0x1, 0x2, 0x9, 0x7f, 0x95, "dfba0da3"}, 0x62, 0x1, @fd, 0x8}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f00000002c0)={0x1f8, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x9c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x83, 0x5, "e3438ab3c1b7b2d95559c64eb76d86b3373bb9ee97f5b36587e34b90c20d12d78731abbdbe37a2cb5163e5fe5a4737e398c13b4d440af08296f640e08312c389b25214644d16e882807bf8cac66ffb22fca1d55929886780f97bbff613170286bf3b5d005cafc0fab5f1c1dcab6e4f5c1234283bddd7f8c40993fcf5daece4"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfda}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x148, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x130, 0x3, 0x0, 0x1, [{0x4}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!-\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '@}\'@@[[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xe, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$+*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, ')](%.},,#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '+#:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-\x9a\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x8c:\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xac}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x1f8}}, 0x80d1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x5421, 0x0) 03:33:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) 03:33:47 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x6, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) 03:33:47 executing program 0: semget$private(0x0, 0x2, 0x40) [ 1068.549468] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:47 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) [ 1068.637555] 9pnet: Insufficient options for proto=fd [ 1068.639445] hfs: unable to parse mount options 03:33:47 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:47 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000700)={0x3, 0xc90, @status={[0x1, 0x1, 0x800, 0xfff, 0x2]}, [0x0, 0x8, 0x51, 0x1, 0x6, 0x40b, 0x3, 0x32b09c47, 0x9d3, 0x8, 0x2, 0x5, 0x101, 0x3, 0x1f, 0x5, 0x40, 0x9, 0xfff, 0x6, 0x0, 0x2, 0x5, 0x731a3b37, 0x10001, 0xffff, 0x5, 0x401, 0x7f, 0x1f, 0x80000000000, 0x401, 0x5, 0x1000, 0xffffffffffffff00, 0x101, 0xffffffff, 0x5, 0x100, 0x4, 0x6, 0x100000001, 0x200, 0x1, 0x4, 0x6, 0x1, 0xce5, 0x8, 0x1000, 0x3, 0x6, 0x7fff, 0x80000001, 0xff, 0xfffffffffffffffc, 0x3, 0x4, 0x4, 0x1ff, 0x0, 0x81, 0x100000001]}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x6, 0xb, 0x4, 0x8, 0x1f, {r1, r2/1000+60000}, {0x4, 0x1, 0x2, 0x9, 0x7f, 0x95, "dfba0da3"}, 0x62, 0x1, @fd, 0x8}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f00000002c0)={0x1f8, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x9c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x83, 0x5, "e3438ab3c1b7b2d95559c64eb76d86b3373bb9ee97f5b36587e34b90c20d12d78731abbdbe37a2cb5163e5fe5a4737e398c13b4d440af08296f640e08312c389b25214644d16e882807bf8cac66ffb22fca1d55929886780f97bbff613170286bf3b5d005cafc0fab5f1c1dcab6e4f5c1234283bddd7f8c40993fcf5daece4"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfda}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x148, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x130, 0x3, 0x0, 0x1, [{0x4}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!-\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '@}\'@@[[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xe, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$+*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, ')](%.},,#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '+#:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-\x9a\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x8c:\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xac}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x1f8}}, 0x80d1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x5421, 0x0) 03:33:47 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000700)={0x3, 0xc90, @status={[0x1, 0x1, 0x800, 0xfff, 0x2]}, [0x0, 0x8, 0x51, 0x1, 0x6, 0x40b, 0x3, 0x32b09c47, 0x9d3, 0x8, 0x2, 0x5, 0x101, 0x3, 0x1f, 0x5, 0x40, 0x9, 0xfff, 0x6, 0x0, 0x2, 0x5, 0x731a3b37, 0x10001, 0xffff, 0x5, 0x401, 0x7f, 0x1f, 0x80000000000, 0x401, 0x5, 0x1000, 0xffffffffffffff00, 0x101, 0xffffffff, 0x5, 0x100, 0x4, 0x6, 0x100000001, 0x200, 0x1, 0x4, 0x6, 0x1, 0xce5, 0x8, 0x1000, 0x3, 0x6, 0x7fff, 0x80000001, 0xff, 0xfffffffffffffffc, 0x3, 0x4, 0x4, 0x1ff, 0x0, 0x81, 0x100000001]}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x6, 0xb, 0x4, 0x8, 0x1f, {r1, r2/1000+60000}, {0x4, 0x1, 0x2, 0x9, 0x7f, 0x95, "dfba0da3"}, 0x62, 0x1, @fd, 0x8}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f00000002c0)={0x1f8, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x9c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x83, 0x5, "e3438ab3c1b7b2d95559c64eb76d86b3373bb9ee97f5b36587e34b90c20d12d78731abbdbe37a2cb5163e5fe5a4737e398c13b4d440af08296f640e08312c389b25214644d16e882807bf8cac66ffb22fca1d55929886780f97bbff613170286bf3b5d005cafc0fab5f1c1dcab6e4f5c1234283bddd7f8c40993fcf5daece4"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfda}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x148, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x130, 0x3, 0x0, 0x1, [{0x4}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!-\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '@}\'@@[[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xe, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$+*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, ')](%.},,#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '+#:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-\x9a\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x8c:\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xac}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x1f8}}, 0x80d1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x5421, 0x0) 03:33:47 executing program 0: semget$private(0x0, 0x0, 0x40) 03:33:47 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 03:33:47 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200002) [ 1068.782973] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:47 executing program 0: semget$private(0x0, 0x0, 0x40) 03:33:47 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) [ 1068.866117] hfs: unable to parse mount options [ 1068.871376] 9pnet: Insufficient options for proto=fd 03:33:47 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) [ 1068.925792] hfs: unable to parse mount options 03:33:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040028bd7000ffdbdf250800000038000180080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="1400020076657468315f766972745f776966690008000100", @ANYRES32=0x0, @ANYBLOB="7d05fa56f41836eb1aaa2a93dd4751120e39cb6f1e2e2f6ef2d53aab0354668bd789b8dd2246d5eed2"], 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) 03:33:47 executing program 1: syz_open_dev$dri(0x0, 0x8, 0x200002) 03:33:47 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 03:33:47 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000700)={0x3, 0xc90, @status={[0x1, 0x1, 0x800, 0xfff, 0x2]}, [0x0, 0x8, 0x51, 0x1, 0x6, 0x40b, 0x3, 0x32b09c47, 0x9d3, 0x8, 0x2, 0x5, 0x101, 0x3, 0x1f, 0x5, 0x40, 0x9, 0xfff, 0x6, 0x0, 0x2, 0x5, 0x731a3b37, 0x10001, 0xffff, 0x5, 0x401, 0x7f, 0x1f, 0x80000000000, 0x401, 0x5, 0x1000, 0xffffffffffffff00, 0x101, 0xffffffff, 0x5, 0x100, 0x4, 0x6, 0x100000001, 0x200, 0x1, 0x4, 0x6, 0x1, 0xce5, 0x8, 0x1000, 0x3, 0x6, 0x7fff, 0x80000001, 0xff, 0xfffffffffffffffc, 0x3, 0x4, 0x4, 0x1ff, 0x0, 0x81, 0x100000001]}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x6, 0xb, 0x4, 0x8, 0x1f, {r1, r2/1000+60000}, {0x4, 0x1, 0x2, 0x9, 0x7f, 0x95, "dfba0da3"}, 0x62, 0x1, @fd, 0x8}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f00000002c0)={0x1f8, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x9c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x83, 0x5, "e3438ab3c1b7b2d95559c64eb76d86b3373bb9ee97f5b36587e34b90c20d12d78731abbdbe37a2cb5163e5fe5a4737e398c13b4d440af08296f640e08312c389b25214644d16e882807bf8cac66ffb22fca1d55929886780f97bbff613170286bf3b5d005cafc0fab5f1c1dcab6e4f5c1234283bddd7f8c40993fcf5daece4"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfda}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x148, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x130, 0x3, 0x0, 0x1, [{0x4}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!-\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '@}\'@@[[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xe, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$+*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, ')](%.},,#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '+#:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-\x9a\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x8c:\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xac}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x1f8}}, 0x80d1) 03:33:47 executing program 0: semget$private(0x0, 0x0, 0x40) [ 1069.019008] 9pnet: Insufficient options for proto=fd 03:33:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040028bd7000ffdbdf250800000038000180080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="1400020076657468315f766972745f776966690008000100", @ANYRES32=0x0, @ANYBLOB="7d05fa56f41836eb1aaa2a93dd4751120e39cb6f1e2e2f6ef2d53aab0354668bd789b8dd2246d5eed2"], 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) 03:33:47 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:47 executing program 3: syz_mount_image$reiserfs(0x0, 0x0, 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:47 executing program 1: syz_open_dev$dri(0x0, 0x8, 0x200002) [ 1069.107973] hfs: unable to parse mount options 03:33:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040028bd7000ffdbdf250800000038000180080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="1400020076657468315f766972745f776966690008000100", @ANYRES32=0x0, @ANYBLOB="7d05fa56f41836eb1aaa2a93dd4751120e39cb6f1e2e2f6ef2d53aab0354668bd789b8dd2246d5eed2"], 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) 03:33:47 executing program 0: semget$private(0x0, 0x2, 0x0) 03:33:47 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:47 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000700)={0x3, 0xc90, @status={[0x1, 0x1, 0x800, 0xfff, 0x2]}, [0x0, 0x8, 0x51, 0x1, 0x6, 0x40b, 0x3, 0x32b09c47, 0x9d3, 0x8, 0x2, 0x5, 0x101, 0x3, 0x1f, 0x5, 0x40, 0x9, 0xfff, 0x6, 0x0, 0x2, 0x5, 0x731a3b37, 0x10001, 0xffff, 0x5, 0x401, 0x7f, 0x1f, 0x80000000000, 0x401, 0x5, 0x1000, 0xffffffffffffff00, 0x101, 0xffffffff, 0x5, 0x100, 0x4, 0x6, 0x100000001, 0x200, 0x1, 0x4, 0x6, 0x1, 0xce5, 0x8, 0x1000, 0x3, 0x6, 0x7fff, 0x80000001, 0xff, 0xfffffffffffffffc, 0x3, 0x4, 0x4, 0x1ff, 0x0, 0x81, 0x100000001]}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x6, 0xb, 0x4, 0x8, 0x1f, {r1, r2/1000+60000}, {0x4, 0x1, 0x2, 0x9, 0x7f, 0x95, "dfba0da3"}, 0x62, 0x1, @fd, 0x8}) socket$nl_generic(0x10, 0x3, 0x10) 03:33:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040028bd7000ffdbdf250800000038000180080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="1400020076657468315f766972745f776966690008000100", @ANYRES32=0x0, @ANYBLOB="7d05fa56f41836eb1aaa2a93dd4751120e39cb6f1e2e2f6ef2d53aab0354668bd789b8dd2246d5eed2"], 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) 03:33:47 executing program 3: syz_mount_image$reiserfs(0x0, 0x0, 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:47 executing program 1: syz_open_dev$dri(0x0, 0x8, 0x200002) 03:33:47 executing program 0: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:47 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) [ 1069.363665] hfs: unable to parse mount options 03:33:47 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x200002) 03:33:47 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000700)={0x3, 0xc90, @status={[0x1, 0x1, 0x800, 0xfff, 0x2]}, [0x0, 0x8, 0x51, 0x1, 0x6, 0x40b, 0x3, 0x32b09c47, 0x9d3, 0x8, 0x2, 0x5, 0x101, 0x3, 0x1f, 0x5, 0x40, 0x9, 0xfff, 0x6, 0x0, 0x2, 0x5, 0x731a3b37, 0x10001, 0xffff, 0x5, 0x401, 0x7f, 0x1f, 0x80000000000, 0x401, 0x5, 0x1000, 0xffffffffffffff00, 0x101, 0xffffffff, 0x5, 0x100, 0x4, 0x6, 0x100000001, 0x200, 0x1, 0x4, 0x6, 0x1, 0xce5, 0x8, 0x1000, 0x3, 0x6, 0x7fff, 0x80000001, 0xff, 0xfffffffffffffffc, 0x3, 0x4, 0x4, 0x1ff, 0x0, 0x81, 0x100000001]}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x6, 0xb, 0x4, 0x8, 0x1f, {r1, r2/1000+60000}, {0x4, 0x1, 0x2, 0x9, 0x7f, 0x95, "dfba0da3"}, 0x62, 0x1, @fd, 0x8}) [ 1069.451212] 9pnet: Insufficient options for proto=fd 03:33:47 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x2, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:47 executing program 3: syz_mount_image$reiserfs(0x0, 0x0, 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) 03:33:48 executing program 0: syz_mount_image$reiserfs(0x0, 0x0, 0x193, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:48 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x200002) 03:33:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) 03:33:48 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x9, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) [ 1069.661013] hfs: unable to parse mount options 03:33:48 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x200002) 03:33:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) 03:33:48 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:48 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x6, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:48 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x0) 03:33:48 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000000)) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000700)={0x3, 0xc90, @status={[0x1, 0x1, 0x800, 0xfff, 0x2]}, [0x0, 0x8, 0x51, 0x1, 0x6, 0x40b, 0x3, 0x32b09c47, 0x9d3, 0x8, 0x2, 0x5, 0x101, 0x3, 0x1f, 0x5, 0x40, 0x9, 0xfff, 0x6, 0x0, 0x2, 0x5, 0x731a3b37, 0x10001, 0xffff, 0x5, 0x401, 0x7f, 0x1f, 0x80000000000, 0x401, 0x5, 0x1000, 0xffffffffffffff00, 0x101, 0xffffffff, 0x5, 0x100, 0x4, 0x6, 0x100000001, 0x200, 0x1, 0x4, 0x6, 0x1, 0xce5, 0x8, 0x1000, 0x3, 0x6, 0x7fff, 0x80000001, 0xff, 0xfffffffffffffffc, 0x3, 0x4, 0x4, 0x1ff, 0x0, 0x81, 0x100000001]}) 03:33:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = shmget(0x3, 0x3000, 0x8, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/234) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) 03:33:48 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0xc, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:48 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) 03:33:48 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x0) [ 1069.898784] 9pnet: Insufficient options for proto=fd 03:33:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = shmget(0x3, 0x3000, 0x8, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/234) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) [ 1069.968585] hfs: unable to parse mount options 03:33:48 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:48 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x81, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:48 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x0) 03:33:48 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) 03:33:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = shmget(0x3, 0x3000, 0x8, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/234) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) 03:33:48 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000000)) 03:33:48 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = shmget(0x3, 0x3000, 0x8, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/234) 03:33:48 executing program 1: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cae76acc4a3fa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9a43a50731aee4", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:48 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x6, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) [ 1070.178648] 9pnet: Insufficient options for proto=fd 03:33:48 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x9, 0x0, 0x2e03, 0x74, @local, @empty, 0xc50ac3c1493deee0, 0x0, 0x2, 0x372c110a}}) [ 1070.213001] hfs: unable to parse mount options 03:33:48 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:48 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) shmget(0x3, 0x3000, 0x8, &(0x7f0000ffb000/0x3000)=nil) 03:33:48 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 03:33:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) [ 1070.337623] 9pnet: Insufficient options for proto=fd 03:33:48 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:48 executing program 0: shmget(0x3, 0x3000, 0x8, &(0x7f0000ffb000/0x3000)=nil) 03:33:48 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:48 executing program 1: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000025c0)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}], [{@appraise='appraise'}, {@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-}'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@obj_type={'obj_type'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) [ 1070.382641] 9pnet: Insufficient options for proto=fd [ 1070.439442] hfs: unable to parse mount options 03:33:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) 03:33:48 executing program 0: shmget(0x3, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) [ 1070.500680] 9pnet: Insufficient options for proto=fd 03:33:49 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:49 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x7, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:49 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) [ 1070.590447] 9pnet: Insufficient options for proto=fd 03:33:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) 03:33:49 executing program 1: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:49 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000000)) 03:33:49 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:49 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) [ 1070.690419] hfs: unable to parse mount options 03:33:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) [ 1070.761095] 9pnet: Insufficient options for proto=fd [ 1070.768028] hfs: unable to parse mount options 03:33:49 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x0, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:49 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:49 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:49 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:49 executing program 0: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:49 executing program 2: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:49 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x0, @planes=0x0, 0x7f}) 03:33:49 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:49 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:49 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, 0x0) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") perf_event_open$cgroup(&(0x7f0000000a40)={0x0, 0x70, 0xe0, 0x7, 0x8, 0x4, 0x0, 0x40, 0x1084, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x9}, 0x248, 0x401, 0x200, 0x1, 0x5, 0x9, 0x6}, r1, 0x6, r0, 0x4) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000dc0)={{r0}, 0x0, 0x0, @inherit={0x58, &(0x7f0000000ac0)={0x1, 0x2, 0x3, 0xfff, {0x8, 0x9, 0x6, 0x5, 0x28000000000000}, [0x1000, 0xfffffffffffffebd]}}, @devid}) 03:33:49 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:49 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x0, @planes=0x0}) 03:33:49 executing program 2: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000040)='9p\x00', 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:49 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:49 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:49 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, 0x0) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") perf_event_open$cgroup(&(0x7f0000000a40)={0x0, 0x70, 0xe0, 0x7, 0x8, 0x4, 0x0, 0x40, 0x1084, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x9}, 0x248, 0x401, 0x200, 0x1, 0x5, 0x9, 0x6}, r1, 0x6, r0, 0x4) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000dc0)={{r0}, 0x0, 0x0, @inherit={0x58, &(0x7f0000000ac0)={0x1, 0x2, 0x3, 0xfff, {0x8, 0x9, 0x6, 0x5, 0x28000000000000}, [0x1000, 0xfffffffffffffebd]}}, @devid}) 03:33:49 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000000)={0x0, 0xd9, 0x9, 0x1}) 03:33:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000002680)='./file0\x00', 0xffffffffffffffff, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="bf470c7f5b21d17f29ec951ab3911c21a12a8769a09632db11b338c1d976c0809bbb1179f589", 0x26, 0x1f}, {&(0x7f00000000c0)="f007b3bcaf9572be83ef8529252684110d850b6645cfccdf1d028cf23f359aae76acc49ffa1156cfe9f3062b2f39b3b116db31b118b2f0673cf63e6a24fb65123c3c03054b4e40be63611a9243a5", 0x4e, 0x5}, {&(0x7f0000000140)="4d715babb21ad9fff2709b3b684b8b3d1b438971859baa1d735abe106cce035118d355d0400c1bff524a41c3f961e5834dcf809c45377f22eb8bfe37d8e988fd079c3db71800b8ce0584e50b835c2b50b337eeb1b016f0deafdd52710f8714605848ea4704177b66a4c768051d495bc1ef4ed2b3b5996d96d62d811ea878fbae3dc4903dbde7313b63847216040c90ac5a13c3d3eba46367bb71e5405d295cde85dbfa5075351c4d9caab35f483640b12f40ce0369928938939989734a5b7ecde1ef1739a09efe1047863e19e94e79c8116f01eb509a9af6fddee1b54c07caa3ede4fcea28785f546138ac38c5ec5af3da", 0xf1, 0x1}, {&(0x7f0000000240)="cd547c6871a92f9e13fd524546b6b98f21ab1ce5e6bf1fbf543537aa1ab7bfe1e7ac6deb2e7775b4b24b9a641485502b7faa62243009356fec2d6e3080e7ce8b3d9073c1e6b17b7c164363f4e4b78f149369e1d01a7f33ac911fb447c1b69bd40b9f107210f66c82dac8e45f9efc1dc8ed94272f29294ec0ebafc9146c8dc471cc2163703127c2da914463a5729f29a18d2541b34c958dfefbe526787dc61602", 0xa0, 0x3}, {&(0x7f0000000300)="f7c86fee17f6e84739fa296427a369ccdaeb1b1aaa23ad9965563407810a965b9ae23f9a44bb71644823e359973cc19b83d13e904b16b9f9224f8cacfd61f6cdd5e9e2ef2bd7e6b54d87190083e0d3706b3920c00d9e613a39ca22b947f4d765507c8af93c1df44a25cd1c45841c2e58c411d18142cb70dcdf1432b8a2f04c05ee8c33523936c82e6ca58aa77e41fe61", 0x90, 0x1}, {&(0x7f00000003c0)="9c2b5c31c2141597452cae5752699592230a8f43dbc101a514dd97b18709fc166574bb03ba9a498671811eedcb67619bb58d45a6db78bd9c3387c6633a6afb48199123aca493fe2c7b679341800921878d16bc0de45dd216ab10aa11e1a9dcf1c1142d8b5d1a9cd592959a389d3e7836951b86e26a68c85ece442fb6209e2ee7c6f7164d9b73afb8c92523d5631ec29e133d2cbe3925cb66574be8b4f24fdd28073a76a4010110386fd847617c4e3348f45da7c2a2b10af2a228e9acb5dbd03b4d70be6d5a5d", 0xc6, 0x40000000000000}], 0x400, &(0x7f00000025c0)=ANY=[@ANYBLOB='usrjquota=syz,notail,appraise,fsname=,smackfsfloor=-},mask=MAY_WRITE,uid<', @ANYRESDEC=r1, @ANYBLOB='-euid=', @ANYRESDEC=r2, @ANYBLOB=',obj_type=,dont_measure,seclabel,\x00']) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x4, &(0x7f0000001200)=[{&(0x7f0000000080)="8cda0c19d6116c5d7a7b90fdc884672360d79c3256fb4c0202860e26dbc06c5897fb9201fca4cfab9e239b6cf36a7ec828c1a035f1af76344661d6f15ae24a81da24a1d027aaef28d1d984bd4d45640017f276c982", 0x55, 0xc3}, {&(0x7f0000000100)="7597311c645a6e48cb98e1fd1f776a7a312640a5a2d46a23df06278e7b8a4653f4fdcaafd1742832cce093d13ef9e3feace50edd52008124e733c249f31dcea6292aa01825b1ffd3992fc0872f92e826b192bf450c4f652754560c4c853c0e7f4d749b3c3745bbbf", 0x68, 0x8001}, {&(0x7f0000000180)="8b0a753220896947784f4f6d1a3d3cbb5eab45bbc7bbe45ef730ccf4955930e3ea14c3e0efa38dd53743db312351a6ba98a28aa91e77cc520f11594559abc1e27391cdb650331502d9b2e631c43b", 0x4e, 0x1}, {&(0x7f0000000200)="ceb98f1e11a2a26f02b20c655d3b7d0dca62b2edd35d6802bc357da08991a404f4dd3e47e044477440091f9c1b10bec7968ea246b05669f7ebc280abcead79879c2ea44504a1b606c5b39c2c72c5084a6ba8fea540f4b9c3843826e63d3bda4a221cd6dc4303419c170ae87754329275fe716722be8e7aea5cd16f0213cd412643487159b73851607f5fd40105a0880ba2531058a8dc603c520b04dbfb0b5a2b83170263855210237131f9b7dc3a197bed1f00b5f0e85e986d6d7f19d837819195ade62f2f721c83e9612bf8ef083644e45d44c6e4f05fec7e9bb076c422d4f6fe50eb1c505e9146ecbbb9ebdcd71158581ecbf6495dfd6d3e42921c6de18fbee404c0fd6147da12a778c166afac8db94dc63f5bf3ca9499e0b698a25d98db5140cadc3cff3ab17549777e21ad58d5be2996baffc0db21e77f9596f9a934e6d034f4081ed7ae1eee5e0f235847000375d49f302b532a7c76731d4b97bf73c2ad1a16472140ace723424c61e786732c89c1576238b2345d24e799e40d1924593c65264341a67cdcc04f5ce96179dd4f8c004f374d56df440ac8f4f7061e6afaf7546eebf155c753cbb7833145809ee0c54f631e2af100dd5676662fc467adaf41adb9ff94862fe2429619538df62b3803b57ce0a878238fea2a138bcb1014ba35187e8d054d148248132f2e6fbbd171391e53a7f768d69b9fc63a305428141ccd187d4afad4be309a9f8dce9d919f0218282b7c0f4dce62174f62d76dac6a73499eabbe6f28e85feec9c4a0ac653e887edf16021f17305e021c031020ab57764d8b7ca5cc580635cca9620827c75f851ae537cebb04097259ff66f938516138d22f63bd42cef5997f298082a8d33c808d0fcc041a7ea9afa459c0edeb792b782067ff9f437cfaa89d2e0635001dd7ecf0cb086df4971073c883cf07b70ef365ecbaa5943bee0de609bd642169cc27b466a052132ce60f8bd804dd696f805ae803e1263f612d339df5615fdd83f6fa23adb315dbbe2301193e13051b675a38527b4c27d698e0ca830e4aff14916b99205c8928d736e1ad50d453170b297b15fdf55120b72d4a79f90cd1bff20c8e418f09ec19323ae333579d081ea6a6d5133197c60e5bac8269524b797a5ac676e2af57a7e371a25f87d4dd897a3b65cf3a3486cfca32527da9774abdd5efecf8bdb0cf6c5673ef295674740f3c7e7609561e6a1fa5352f02df1b19d2c1cda8e4de1b86996ebfb00c628e7a35c122e041ae8ec057eb0803542f1ff81cd7e19a434fe9a1b721ff601f9ee12833c400de3504a721e4d42645a2b5fed2d7a6274fb71268398bead0e8656b835a2709fce0dc8ed4cf7de77454d8ce33ce2566c5f0e3ade3a95a445ef1968b58858e466cf6a8503789d3f656813affc1689afc669444aac452cb83742d7825d44c03410533fb669174ca751a2dfe35790858845d8bc85bda4c59704aa92e27cf707200845aba3d823cc3ebadb869c575edb75bac9dd20d17e614a7b7d3cf12547d5e04466bdb3018c7d634e8bfb7e2cfe70db8e9f637417352da76c29b2818493d85ee2a1701148ac84cb65148ae5af11301ddd910160c6f46959cb582fe65f76b7ca92f79125727b93157dde8996b50583fd56e881fc92d6dd6590b2034b3323bfb2cf88df2ba9d741e5ded5866556b8b8a3cecc73dba1e8d58b28f2a4e150ffd38d1df78b1f0e4979c482c9fdeffeaaddaaab2d01d5d1be39b8102f3fd88728c8e12513f1b5bce4ba8f988dbec3f29878cc34689ce9540029141eaed92aec84438a1b47588a9967ef860bf623a5f2f92b125abd15ab0cd31c7dea1003c8a0d7de6c2f4dde5b05fbc7398d278ddcc1d30cf50847a54deeb35519ea9d1ba830489f2d2c207d52489640eeb3f989e53209e7c7395b204fb8ca1f0ad6ac96c08b623ff18e1650c3436c57391a30c1422251afd78fab858901e76e17ff1347b05f8f932a884ae2447a33555f14838ec51b070e5d670a55cc1afce9da3fa3d6f6d49dad27a3a3dc35350fc3809ac89c9acfdf010eb19f04ba2890acb914c17aedac97ac708b2f51e5b243d338ee1920a6a2fe1bf0679c357cc767e065cf938026c791f6ffd8bf37fac1d73cfa48557221c808f6370ad948f04fc856ca759a779ce675c4b8ca27c8e76b625d6b7868da39080a0eb60f16b87f0e32269c94824cebeb9569bae0588602e7f4a183b327ace6f5833e4acb2d78bc959b900d18a68033551ab773b462dcb8b67be2ca820e4d17bec9e85596707b19a7755e78219b7bd72a024e081a69019966f57160bda69fee6100fa75ca4aac1e7818f35bd3ad134e492981a81d2b5f6dbcde1628f385bfaf0f2af55df4657bc3c2eb8dc0dc4184a40ce0f742c424bd5748985038563b11f3f555792bc71717e36a62a72faa4d5a212e983de3a021b05d56ad6c01cd9fb71a0eecb58a119c9028ea2badae910e0f701d5ab8bee7f8c1b7e86a8d6e34492a452c5b8f5dd86aabdac19f4ccdac4ba0a55587bbc5bfea04f2c791be259ffc0fde459f1993854e036ac030fd765e2d5a2b28db971cad9a25c6c88806a95682624b86b94014d7e23e57c121bcb1a2f300241fbe74635ebcd32591402b388ac76a72dbcdd6fbec515c20b8df8001795b29399c024403aceefb148196fb5a6e55316ed0552498b530141e6c73736b80c16f30c64f6d19b3a895a20a3f4280735189e511561e89ffb2693e1111f800b60f2defe79e58217e61c7b45a03ca41ca5636b6bdf4a820adf4746621679336e4fcfb9d662547074217da6b5fb19bc1607b9f7c72ce6fbd9f35bab234b4c56b150540069992174dd503d10a6c3f8ab2221fd31a871bb82fb93dc4ecb4d234cd021b400ee2d9833301b49fe0da852fe79648e6608456966d64c4942d83644ad2f71ae9bc75f20fa4c2d733c5bea379db9f8ec40d1944dbfea8e306fd3eb8edc64ce6a939dd8da918c41fed003efe1bf5071524c82d15f57f3ca7bd22fde81aa0d2f26440e8a086a123a538b793064b086a43942143aac8531a556e0946a8238fecbb312d043a0004f13b430c030df736832db864b3f48a38473c553b4d9a3c5b26f394deffd8c9d2fccc7b2faa03ec7a1f0326eca9dff3ee91f98b6f29b88bebdd363d50c8fbfcc299bf8ddb6ba2d840ed74db6cae60ab0141ee265274531d7f7e83c9d89604768cd8eea367805addb8e0d4b45f319ee00ba340c793f5ea005703a6b3d00b7e5e8c4466950d75150a9af8240f45546c054a4a29a80a5381b4ca34e06a0508b23a469f1511eadaff760862ae24e8992b8c113153001de16c420ae99efee167d203b3f76aaaff57bc17220f673bd5956cdb81836feaaeaf7bbbc840b7ba7a5fe8dbb569319a84c4ac1dbaacd2d0b9d002340bff270008f8908ca935c47ebd0cdab775fd402c36914d518a025ef6c7e6444ee7f73f83042dbfbfaa298341c8233857d8e51a51f68b68d2b722817670acd6c4a62448ed23ff3a0555d5383cb2fefde390dd9d0e0d061512fa411ea50da5ed84a202bdcdea4edf0e59025ca5a1ac1b7a6eb9e7902091c6d380d0f868db2eb49e664f421cc489885b93c81eb4abed89b06e7d7af521a7b03bcaad3a6d61c4b3af0c70c8ccb675184bff87f3c1756a9b6357522484f7cbff432545c45cecd3787fd97c49c756af905a9b1db2b4ce8ab0795115126d6c5d7c1e741abcb985fd2ff1bcf1bc475fd19c89193d5f661eaf18afed462340c533cf53420127184ec0e6563079fd6f2de90f7f14c5868f46abefa706e322eccebc626c1c27f9c19801d8d96069043d5aef8f139e60bb98d4459f6d0307d43fc1f249b4c6cf4e5b7ede18a79470a24d4fde9609a5b996d25f113377e84b6d00803a4a327fa96969705db7510df64ba654b529950fa5823ba937b5e285ed45b9c0f846159186bab169962643c19b1f22ddcace11fa8475d768a3f8879b22ba61c6d865f26aa6eefb6e7be1785267f8da2eda23ac0900ea9b265db17648bc0e9438595d69296453506fd615acb5358887095ad96eb1b90facf2e159f558b82fb157a18d594b6fd211f65d7acc1c91ecb653466dc3222ace8cb4f45bac462386c9cc64ec27713d4c94ca8ab452ea06ee2d9446f89988327b3c10f10b2ce5459be83a1d6f17e1b2ea7f287227f0e859e330de2b0e6d55bb26db296a059cd0db04039516f6a12305ac813e412110e072f282df4dbe11f58e89b8ab57b9de10d60b2701fbfc40a6889a40b251553f671f5b65f910b6e378342826765b152d4e4e127237a206b3a76eac4a21ed86ade9b57059e780b7f03f24d882e491fe0f38ebfd05ae369d85448bfae6743f789ebbe41fde60f0edbbc7a2e3a1ea6c6f7255ff65f5e033ed1dfd27b5e84113e26388f679e8d30767a67b7619f50c7b507466acd5a918c02e6a4fba21eadbb78fb0349ac4e43ad00d11215a247dff700de93987970e5e137238706c88305168a3582d0ef03d4ed4b0dbaf750eb20f55fe0bb51e9be5f9939a1ddf5c9f581f9960d4a93f1cf287da77fa35a477b909e8eb8915fac74f9e4a4982780264acd8496bb28e9d1263d521901fee727bcb3046e11e5703c3b7b69ea100232ca6c88991bdea580e352910117b01063d07d0fc92085c2299fc1a225b8cd30b6205b0285f347586427b7d51c6b5952452f7808fb14a99a5bde5324c31458ebf7d7047610d49928fdb294ce43440434eeb5e5a07a7b760ea18e4a018ab335d65310c640fa1cd6d789195cabb19d8fcc37f635f2007066840deb04ae1292cf93d3637839b32cf121f75cfa373e6e228feb5818a9ec44f1ae2ef0c9bcc90d267b8105592f9e0f850412261b5e871bf8b395b07be9e12eeec042b9328969c3dda4002d56e981502a3413d959530d2f25bd6ef098249698ec98cc8e074940533b36a07b66e0674a5082af2b11a95fc1d6bad469f29a123f5b1e60556eec8b149115d3b073645e4a9db154531680ebf2839329e58c7c994be933fe3e67f467f396cc3f0ac30531492e0b605dada4530b8e28e324d2f2a2dec15409a4600845877d8aac0e435c1b0d23b0c9840b47ffa433b0d39362baf1adb5a688af23b38d084e6cbd92c00bb6ce71e70358eddc0cf9eab918d5782bf24cf0bab8b03dd6cb1cd805b6fb9854cb6a4e01db12897db99195c1e05b91c15993207fe0c7b7dda116c36a4e99bf5ba1762faff02cd6d9caa5caa0a9bc23fff59534e4fb72851f9d59faca2ff4348d2707677d28e14763ffe42b9405a07d1e9e899695016e6ae655f3d3205f8d9d549d919b35451bd1b449116650d9e85b5ee146dde9fb2010f3e18249dd83576f082448c12b0d642a5b3799cf8865bfd168c33e05ee9b12b2afb98dd0785c1f678513a6957d25cd66e59be797f113ba9b6194e9da8eb7d5569248eb330e4e2df157895e07aa262fe2b321468665b168c147cb2cf294ed05ff753110a6667a401cfbd5d052368adb4125cb3e18b23d3ba18a2b3b909b87c5fb1394da2aa1da74d8fe1f3aa555e270865942256e1e342f0493697405aae02f364c91117c8d99e5d2a196f2bb1d327495fb21a54bb120343a3ad61784d13d3a2e618d007b1db16ffc1d1ccb6cbdfe571d36bd2c2532c064e635fd8e8c74682c8f5af5cf77fef87dd9314b8faa8df1fba5a8547782be78773689988e40ca260fd79bc2708de7553217f96d664aef10177e980ed936df8dff405037120803e53fee931f153dcfb5bba852b9ee7219c7f565bfdede4a3e68f544fd1dff3f620b2c17a739d61e", 0x1000, 0x7fffffff}], 0x800023, &(0x7f0000002740)={[{@session={'session', 0x3d, 0x1}}, {@quiet='quiet'}, {@quiet='quiet'}, {@uid={'uid', 0x3d, r1}}, {@part={'part', 0x3d, 0xc3c0}}, {@session={'session', 0x3d, 0x9}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00qx \x02\x90\xe2p\xcf\x84[\x94Ux\xa3\xd1F\x86})8\xc2E\xe2\x93x\xde\x7f)c\xcb9n|\x8a\'\xa07\x81\xfeU[\xf6\xc9\xba\xbe\x10jEg\xf1}\xc09F\x7f\xd1\xb0\x1fo\xbeZ\x91\x1d\xc2v\x96\xf64\xb0\xa9\xce\x9c?HV7\x82\x10B\xae\xe7\xbf\x97\xad[\x0e'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@subj_user={'subj_user'}}]}) 03:33:49 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:49 executing program 1: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:49 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, 0x0) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") perf_event_open$cgroup(&(0x7f0000000a40)={0x0, 0x70, 0xe0, 0x7, 0x8, 0x4, 0x0, 0x40, 0x1084, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x9}, 0x248, 0x401, 0x200, 0x1, 0x5, 0x9, 0x6}, r1, 0x6, r0, 0x4) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000dc0)={{r0}, 0x0, 0x0, @inherit={0x58, &(0x7f0000000ac0)={0x1, 0x2, 0x3, 0xfff, {0x8, 0x9, 0x6, 0x5, 0x28000000000000}, [0x1000, 0xfffffffffffffebd]}}, @devid}) 03:33:49 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {r1, r2/1000+10000}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x4, 0xc0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x5421, 0x0) 03:33:49 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) [ 1071.318955] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "appraise" 03:33:49 executing program 5: syz_mount_image$hfs(0x0, 0x0, 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:49 executing program 1: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:49 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, 0x0) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") perf_event_open$cgroup(&(0x7f0000000a40)={0x0, 0x70, 0xe0, 0x7, 0x8, 0x4, 0x0, 0x40, 0x1084, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x9}, 0x248, 0x401, 0x200, 0x1, 0x5, 0x9, 0x6}, r1, 0x6, r0, 0x4) 03:33:49 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:49 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {r1, r2/1000+10000}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x4, 0xc0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x5421, 0x0) 03:33:49 executing program 1: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:49 executing program 2: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) [ 1071.531526] 9pnet: Insufficient options for proto=fd 03:33:50 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, 0x0) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:50 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {r1, r2/1000+10000}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x4, 0xc0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x5421, 0x0) 03:33:50 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:50 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 03:33:50 executing program 5: syz_mount_image$hfs(0x0, 0x0, 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:50 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, 0x0) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") perf_event_open$cgroup(&(0x7f0000000a40)={0x0, 0x70, 0xe0, 0x7, 0x8, 0x4, 0x0, 0x40, 0x1084, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x9}, 0x248, 0x401, 0x200, 0x1, 0x5, 0x9, 0x6}, r1, 0x6, r0, 0x4) 03:33:50 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {r1, r2/1000+10000}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x4, 0xc0) 03:33:50 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 03:33:50 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:50 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:50 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000008000000abe82fbf057b04ea073e6aaa2e1b2ba83f39b4d777b976310555"], 0x14}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000055c0)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005580)={&(0x7f0000005180)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x20000090) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x5451, 0x0) 03:33:50 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 03:33:50 executing program 5: syz_mount_image$hfs(0x0, 0x0, 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:50 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {r1, r2/1000+10000}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) socket$nl_generic(0x10, 0x3, 0x10) 03:33:50 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) keyctl$negate(0xd, r1, 0x2, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) 03:33:50 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:50 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:50 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:50 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:50 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {r1, r2/1000+10000}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) keyctl$negate(0xd, r1, 0x2, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) 03:33:50 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="457db7bd1cf693538d0bf0312c75be61503f8a5f45be9eac6facb454435856dd22eec470793bd4825f6cee", 0x2b, 0xfd}, {&(0x7f0000000180)="464e6b1dbca0c4ca9052ccabbcda84614094b6e5a58e88969dda1a350d935dd47af4d33d39b82eb1ac6fd74948ffb9158eafed9fea0c2c8338f257b01606fc0ef05506a110b06b32c9d9c986b222a8b6227a865deaa0017037617610b379d1d05207ffb020560d032c4d5e31d25265407d9036dd1480ebdced4fbd87a0a196a07b55d0189a9c35ff57c02ab8a2e789b7cad1de5316b8fffb13cb91302428a721f3f6e6c5e69081868aeb1b5fc2cbd06bc32cd158ea613e8996ffc6b24030", 0xbe, 0x100}, {&(0x7f00000004c0)="02b7281b3a30d43a7f06a5b266071197bf9e68e21cb8b5f528be89057d33804641d164be0d5b9b2f2c79071ebbdfc5d2bdff04f60a0838ae2123a053626e56138404bb6b078b2d86cffda56b73b1ffb83ac9fdbd56bc4f2f5f07990b24ef912455321af482363bcd150ee916c8e6c4e12760d91c0aff638ca20b2b93021fc2916957dcf8d75c91a589743e7dd9fa65e0a74205a5403d92182fa8040ba577c5c1bdab3da1089a651395b05e756f3a618be640b851c29f567612bbe10e9db5ba52651f29bca3bb4faf0abaa59b55524c1598c63b37edd38584", 0xd8, 0x3}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) [ 1072.062840] 9pnet: Insufficient options for proto=fd 03:33:50 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:50 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:50 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) keyctl$negate(0xd, r1, 0x2, 0xfffffffffffffffb) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) 03:33:50 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:50 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) [ 1072.221780] 9pnet: Insufficient options for proto=fd 03:33:50 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:50 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) keyctl$negate(0xd, r0, 0x2, 0xfffffffffffffffb) 03:33:50 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:50 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:50 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 03:33:50 executing program 4: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) [ 1072.377106] 9pnet: Insufficient options for proto=fd 03:33:50 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) 03:33:50 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:50 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:50 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:50 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 03:33:51 executing program 4: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:51 executing program 2: request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) 03:33:51 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) [ 1072.629521] 9pnet: Insufficient options for proto=fd 03:33:51 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:51 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) ioctl$sock_bt_hci(r1, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:51 executing program 4: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:51 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}]}}) 03:33:51 executing program 2: request_key(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) 03:33:51 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:51 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 03:33:51 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:51 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) ioctl$sock_bt_hci(r1, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") [ 1072.846167] 9pnet: Insufficient options for proto=fd 03:33:51 executing program 2: request_key(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) 03:33:51 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}]}}) 03:33:51 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:51 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:51 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 03:33:51 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0xd2f, @status={[0x1ff, 0x6, 0x1f, 0xfffffffffffffffd, 0xbf, 0x2]}, [0x5, 0x400, 0x0, 0x2, 0x9, 0x6, 0x3, 0x8, 0x7ff, 0x1, 0x7, 0x7, 0x75f63447, 0xfffffffffffff0af, 0x8, 0x7, 0xe917, 0x5, 0xce, 0x6, 0x1f, 0x4, 0x8, 0xf88, 0x1, 0x2, 0x803, 0xee, 0x800000000000000, 0x7, 0x8, 0xa656, 0x7, 0x5, 0x653, 0x0, 0x8879, 0xffffffffffff0672, 0x2, 0x73a6, 0x8000, 0x100, 0x0, 0x74e, 0xff, 0x2, 0x6, 0x1, 0x70b61af, 0x7fffffff, 0xffffffffffffff24, 0x101, 0x9, 0x9, 0x9, 0x3d, 0x40, 0x80000000, 0x4cf3, 0x0, 0x40, 0x6, 0x100000000, 0xf2f2]}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) ioctl$sock_bt_hci(r1, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:51 executing program 2: request_key(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) [ 1073.045682] 9pnet: Insufficient options for proto=fd 03:33:51 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x3, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:51 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:51 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}]}}) 03:33:51 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 03:33:51 executing program 0: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:51 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x0, @planes=&(0x7f0000000280)={0x8001, 0xac3, @fd, 0x6}, 0x7f}) 03:33:51 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:51 executing program 2: request_key(&(0x7f0000000000)='cifs.idmap\x00', 0x0, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) [ 1073.249647] 9pnet: Insufficient options for proto=fd 03:33:51 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={0x0, 0x0, 0x10}, 0x10) 03:33:51 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}]}}) 03:33:51 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:51 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x0, @planes=0x0, 0x7f}) 03:33:51 executing program 2: request_key(&(0x7f0000000000)='cifs.idmap\x00', 0x0, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) 03:33:51 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:51 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={0x0, 0x0, 0x10}, 0x10) 03:33:51 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x0, @planes=0x0}) [ 1073.439920] 9pnet: Insufficient options for proto=fd 03:33:51 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:51 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:52 executing program 2: request_key(&(0x7f0000000000)='cifs.idmap\x00', 0x0, &(0x7f0000000080)='^#!:[]\x00', 0xfffffffffffffffd) 03:33:52 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}]}}) 03:33:52 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={0x0, 0x0, 0x10}, 0x10) 03:33:52 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={0x0, 0x0, 0x10}, 0x10) 03:33:52 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 03:33:52 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") [ 1073.667624] 9pnet: Insufficient options for proto=fd 03:33:52 executing program 1: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}]}}) 03:33:52 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}]}}) 03:33:52 executing program 2: request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffffd) 03:33:52 executing program 5: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) 03:33:52 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 03:33:52 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") [ 1073.880556] 9pnet: Insufficient options for proto=fd 03:33:52 executing program 2: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}]}}) 03:33:52 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}]}}) 03:33:52 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) [ 1073.934222] 9pnet: Insufficient options for proto=fd 03:33:52 executing program 5: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}]}}) 03:33:52 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:52 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000002c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0f177386"}, 0x0, 0x0, @planes=0x0, 0x7f}) 03:33:52 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:52 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") [ 1074.133892] 9pnet: Insufficient options for proto=fd [ 1074.133977] 9pnet: Insufficient options for proto=fd [ 1074.147749] 9pnet: Insufficient options for proto=fd 03:33:52 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 03:33:52 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:52 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}]}}) 03:33:52 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 03:33:52 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:52 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") [ 1074.365621] 9pnet: Insufficient options for proto=fd 03:33:52 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="747970657dbb28c90624836f6465706167653d69736f383835392d312c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d2d9a002c646f6e745f6d6561737572652c6f626a5f747970653d407d2740405b5b002c736d61636b6673666c6f6f723d2e2c66756e633d4d4d41505f434845434b2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:52 executing program 2: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@measure='measure'}, {@uid_gt={'uid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>'}}, {@smackfsdef={'smackfsdef', 0x3d, '(^[!/'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 03:33:52 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}]}}) 03:33:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {r2, r3/1000+10000}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd=r4, 0x0, 0x0, r5}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) 03:33:52 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") [ 1074.545272] 9pnet: Insufficient options for proto=fd 03:33:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {r2, r3/1000+10000}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd=r4, 0x0, 0x0, r5}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) 03:33:53 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 03:33:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000000)={0x4, 0x6, {0x4, @struct={0x6, 0x816}, 0x0, 0x7, 0xffff, 0x3, 0x3, 0x1, 0x14c, @usage=0xae75, 0x5, 0x7, [0x6, 0x0, 0x1, 0xff, 0x9, 0x80]}, {0x5, @struct={0x2, 0x7}, 0x0, 0x3ff, 0x0, 0xe0, 0x1000, 0x0, 0x10, @struct={0x3}, 0x91, 0x8fd, [0xfffffffffffffffd, 0x2, 0x400, 0x1, 0xffff, 0x4]}, {0x8001, @usage=0x4, 0x0, 0x757e8ded, 0x100, 0x5, 0x9, 0x10000, 0x4d, @struct={0x3ff, 0xffffdad1}, 0x8001, 0x6, [0x9, 0x200, 0x10001, 0x51, 0xffff, 0x7f]}, {0x4, 0x4, 0x8}}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000400)={0x3, [0x7, 0x8001], 0x9}, 0x10) semget(0x1, 0x0, 0x0) [ 1074.618557] 9pnet: Insufficient options for proto=fd 03:33:53 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x2, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000000)={0x4, 0x6, {0x4, @struct={0x6, 0x816}, 0x0, 0x7, 0xffff, 0x3, 0x3, 0x1, 0x14c, @usage=0xae75, 0x5, 0x7, [0x6, 0x0, 0x1, 0xff, 0x9, 0x80]}, {0x5, @struct={0x2, 0x7}, 0x0, 0x3ff, 0x0, 0xe0, 0x1000, 0x0, 0x10, @struct={0x3}, 0x91, 0x8fd, [0xfffffffffffffffd, 0x2, 0x400, 0x1, 0xffff, 0x4]}, {0x8001, @usage=0x4, 0x0, 0x757e8ded, 0x100, 0x5, 0x9, 0x10000, 0x4d, @struct={0x3ff, 0xffffdad1}, 0x8001, 0x6, [0x9, 0x200, 0x10001, 0x51, 0xffff, 0x7f]}, {0x4, 0x4, 0x8}}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000400)={0x3, [0x7, 0x8001], 0x9}, 0x10) semget(0x1, 0x0, 0x0) 03:33:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {r2, r3/1000+10000}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd=r4, 0x0, 0x0, r5}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x2, 0x0) [ 1074.796649] 9pnet: Insufficient options for proto=fd 03:33:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b303459d631c2b9ee301f32b67b026adf5d392eb89d87e0e0ad21f91031f58fc165242278999a7c1f1b1399ffa603d90419fc56b6aad3be9cced12333f7cfd41376a8f2ad613580e0d1c2145c7a123c0151cad92efc20668a") 03:33:53 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x5421, 0x0) 03:33:53 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x3, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:53 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 03:33:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x7, &(0x7f0000000500)=[{&(0x7f0000000080)="882480a636cdfed304ad00c5dbc924cbda3abd66adea05b180cdf4ebffa0de485b044a514eedef498914702cfb35664110f22a7af7053104a4e848aeb695a0db9feb6332e79e723e2ce069b1371f969dd3f84f6be1c4bf0b0fc6845b9f9c8583f263ec91d7eef393d7cbdfb84da342b3734058f31aec05741258142a2cdf89761639ac0a2cc91acdc602d3f8907b7ee8ebcde1be4b90cd8ee4ffcd6b10426a73731176cb6a8ee5636356df9d507c5fd2fd00cf512bb13255103987a7162ccd46fc27b0e24fe62542c5903c2f3ab1e17b5934e5bd08388ba1a5a55b236b343dca", 0xe0, 0x28}, {&(0x7f0000000180)="d98b30603c01415c8d22414eee0ca46989a8ca7d3e5756d0e63cbc0362cddbfda8976b8b7ab81582c1419ce7befbbc3b12cb87a9afa1da515fbf116d8d98d20afea8e7cd12b3e3d54535a61a4cb79c3a86101fea038ee88b902ef615e555506422c34d2e76edcc9919c698a461c1f3b9a7653a5b53bf396143a6384b7bdd8e39ca782d43bc615f884d9612d240330115ec8308a20572564f75b1e26ac821ad6ab224500495511b779ddd01d2244a51cbcf199028b90588ec87536a620f220a461f1662cdc403326dc41c0d19774070d8d1b9ba370ce3e98d760583b80a83934a465dc6c944dac884c07ae47bacf0d0f1be8faa", 0xf3, 0x7}, {&(0x7f0000000280)="e58f28251a5d49576b7f66ebd8ca9c2c1ec62925ff54f93e36a7b6be26d2fd50c8a74378c83faf5cc0dec9954f043d73e1d0f92dd45c52695631cb9dbe98937bad950e3596717d00630cfb30c5eaf4aad7102f6e45dfb78ac70f85cd8898df0032b73186addb687993da35b1296b9e058c5c8eeda080cdcbd682915776f01abffc65a335", 0x84, 0xfffffffffffffffe}, {&(0x7f0000000340)="99731faa5422512d5d5c2db677ce2105bc63d39ee400c289bd1685197e3e08", 0x1f, 0x101}, {&(0x7f0000000380)="c595b361dae5a471f107dbcfc5a044627731348151afbf57d8803cf2352f211a32d1ca7ab6fe5247f6965955f4fc0c0a173bb78a065e7ac0572ae66a206fbd7f95eb5e7089a553baf00230caa6ae9579b7d2c5b61f2511554c416cf4cf755cb709192bb568ade9d95ee9406796adab8d885634968eb30788bb26a14f7b7ada998901c75773ecac0f9276b420c3c7f53bf2659982a4081346f7f27e5083e620afdb3ccca06c9749c556589400116a5824611e6ae7ea0411c72a15ba204f21c4d6ef368433f7d1318b810fa85b", 0xcc}, {&(0x7f0000000480)="3957513ba6da3732b7a7bb615f70d86c4116f0a55a70f9", 0x17, 0x8}, {&(0x7f00000004c0)="5c041483898105da019979b931b75ec34327a40482ccf0d112776f058d3dec30e859018f51d3710b0acd73742761371c1e966fdca46ff8", 0x37}], 0x800408, &(0x7f00000005c0)={[{@tails_on='tails=on'}], [{@subj_user={'subj_user', 0x3d, '%,%'}}, {@fsname={'fsname', 0x3d, '\\'}}, {@context={'context', 0x3d, 'user_u'}}, {@obj_type={'obj_type'}}]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5421, 0x0) 03:33:53 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r3 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {r1, r2/1000+10000}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd=r3, 0x0, 0x0, r4}) 03:33:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:53 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x5421, 0x0) 03:33:53 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x1, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) [ 1075.005922] 9pnet: Insufficient options for proto=fd 03:33:53 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r3 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {r1, r2/1000+10000}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd=r3, 0x0, 0x0, r4}) 03:33:53 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x40305828, 0x0) [ 1075.100501] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "subj_user=%" 03:33:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:53 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x1, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:53 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x5421, 0x0) 03:33:53 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r3 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {r1, r2/1000+10000}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd=r3}) 03:33:53 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x40305828, 0x0) 03:33:53 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:53 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) 03:33:53 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r3 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {r1, r2/1000+10000}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd=r3}) 03:33:53 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x5b, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:53 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x40305828, 0x0) 03:33:53 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:53 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {r1, r2/1000+10000}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:53 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x1, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:53 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) 03:33:54 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:54 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x40305828, 0x0) 03:33:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:54 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:54 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0xff, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:54 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) 03:33:54 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:54 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:54 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x40305828, 0x0) 03:33:54 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:54 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:54 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) 03:33:54 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x81, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:54 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x40305828, 0x0) 03:33:54 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:54 executing program 1: clock_gettime(0x6, 0x0) 03:33:54 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613351a9f188175831fd44f523edc6fdbe14a3de7841d712f52704e7896f75f472842250286282a7369a40b30") 03:33:54 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9cfad52e"}, 0x9f, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:54 executing program 3: r0 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x40305828, 0x0) 03:33:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:54 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:54 executing program 1: clock_gettime(0x6, 0x0) 03:33:54 executing program 2: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, 0x0) 03:33:54 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:54 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9cfad52e"}, 0x0, 0x4, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:54 executing program 3: r0 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x40305828, 0x0) 03:33:54 executing program 1: clock_gettime(0x6, 0x0) 03:33:54 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:54 executing program 2: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, 0x0) 03:33:54 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:54 executing program 3: r0 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x40305828, 0x0) 03:33:54 executing program 2: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, 0x0) 03:33:54 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9cfad52e"}, 0x0, 0x0, @planes=&(0x7f0000000080)={0x4, 0x5, @userptr, 0x2}, 0xfffffffe}) 03:33:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:55 executing program 3: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x40305828, 0x0) 03:33:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:55 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9cfad52e"}, 0x0, 0x0, @planes=0x0, 0xfffffffe}) 03:33:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)="f7cddd382f7def80feedf5e1f4ae38706dae7203dc3d843304bbfa21d6c75e3ff95bbf0366f480838d22d613") 03:33:55 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 3: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x40305828, 0x0) 03:33:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)="f7") 03:33:55 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9cfad52e"}, 0x0, 0x0, @planes=0x0}) 03:33:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 5: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:55 executing program 3: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x40305828, 0x0) 03:33:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)="f7") 03:33:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:55 executing program 5: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:55 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, 0x0) 03:33:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 5: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x6, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, 0x0) 03:33:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:55 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, 0x0) 03:33:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, 0x0) 03:33:56 executing program 1: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, 0x0) 03:33:56 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, 0x0) 03:33:56 executing program 1: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 4: ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, 0x0) 03:33:56 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)="f7") 03:33:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, 0x0) 03:33:56 executing program 1: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 4: ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x0) 03:33:56 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 4: ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, 0x0) 03:33:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x0) 03:33:56 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:56 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x0) 03:33:56 executing program 3: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:56 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:56 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5460, 0x0) 03:33:56 executing program 3: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x10, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:57 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5460, 0x0) 03:33:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:57 executing program 3: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x12b, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:57 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5460, 0x0) 03:33:57 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x3, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 2: ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:57 executing program 0: r0 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x0) 03:33:57 executing program 2: ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0xc, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:57 executing program 0: r0 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x0) 03:33:57 executing program 2: ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x2, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:57 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:57 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 0: r0 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x0) 03:33:57 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x1, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:57 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:57 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:57 executing program 0: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5460, 0x0) 03:33:57 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:58 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x38, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:58 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:58 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:58 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:58 executing program 0: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5460, 0x0) 03:33:58 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:58 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:58 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d3, &(0x7f0000000b40)) 03:33:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:58 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:58 executing program 0: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5460, 0x0) 03:33:58 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x3, 0x1, @fd}) 03:33:58 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:58 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:58 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:58 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:58 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x1, @fd}) 03:33:58 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:58 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:58 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:58 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:33:58 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, 0x0) 03:33:58 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:58 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:58 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x541b, 0x0) 03:33:58 executing program 1 (fault-call:2 fault-nth:0): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:58 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x0) 03:33:58 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:33:58 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) [ 1080.391537] FAULT_INJECTION: forcing a failure. [ 1080.391537] name failslab, interval 1, probability 0, space 0, times 1 [ 1080.429651] CPU: 1 PID: 8326 Comm: syz-executor.1 Not tainted 4.19.177-syzkaller #0 [ 1080.437662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.447117] Call Trace: [ 1080.449738] dump_stack+0x1fc/0x2ef [ 1080.453532] should_fail.cold+0xa/0xf [ 1080.457611] ? setup_fault_attr+0x200/0x200 [ 1080.461952] ? lock_acquire+0x170/0x3c0 [ 1080.465944] __should_failslab+0x115/0x180 [ 1080.470287] should_failslab+0x5/0x10 [ 1080.474095] kmem_cache_alloc+0x277/0x370 [ 1080.478281] __anon_vma_prepare+0x5d/0x560 [ 1080.482720] do_huge_pmd_anonymous_page+0x106e/0x1e60 [ 1080.488103] ? prep_transhuge_page+0xa0/0xa0 [ 1080.492609] ? mark_held_locks+0xf0/0xf0 [ 1080.497047] __handle_mm_fault+0x289c/0x41c0 [ 1080.501605] ? vm_insert_page+0x9c0/0x9c0 [ 1080.505868] ? check_preemption_disabled+0x41/0x280 [ 1080.511511] handle_mm_fault+0x436/0xb10 [ 1080.515599] __do_page_fault+0x68e/0xd60 [ 1080.519791] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1080.525375] ? spurious_fault+0x840/0x840 [ 1080.531628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1080.536666] page_fault+0x1e/0x30 [ 1080.540473] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1080.546568] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1080.566743] RSP: 0018:ffff88808ee779a0 EFLAGS: 00010202 [ 1080.572565] RAX: 0000000000000004 RBX: 000000000000005c RCX: 000000000000005c [ 1080.580451] RDX: 000000000000005c RSI: 0000000020000b40 RDI: ffff88808ee77a00 03:33:59 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:59 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:59 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x541b, 0x0) [ 1080.590818] RBP: 0000000020000b40 R08: 0000000000000001 R09: ffffed1011dcef4b [ 1080.598454] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000020000b9c [ 1080.607698] R13: ffff88808ee77a00 R14: 00007ffffffff000 R15: 0000000000000000 [ 1080.616804] _copy_from_user+0xfc/0x130 [ 1080.621102] hci_get_dev_info+0x82/0x6c0 [ 1080.625263] ? hci_get_dev_list+0x330/0x330 [ 1080.630502] ? hci_sock_ioctl+0x147/0x7d0 [ 1080.634929] ? lock_downgrade+0x720/0x720 03:33:59 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1080.639211] ? __local_bh_enable_ip+0x159/0x270 [ 1080.643902] hci_sock_ioctl+0x208/0x7d0 [ 1080.648722] ? _parse_integer+0x180/0x180 [ 1080.652897] ? hci_sock_release+0x590/0x590 [ 1080.660469] ? __might_fault+0x192/0x1d0 [ 1080.664560] ? _copy_from_user+0xd2/0x130 [ 1080.669242] sock_do_ioctl+0xcb/0x2d0 [ 1080.673230] ? compat_ifr_data_ioctl+0x150/0x150 [ 1080.677997] ? __lock_acquire+0x6de/0x3ff0 [ 1080.682265] sock_ioctl+0x2ef/0x5d0 [ 1080.685903] ? dlci_ioctl_set+0x30/0x30 [ 1080.689985] ? ksys_write+0x241/0x2a0 [ 1080.693892] ? dlci_ioctl_set+0x30/0x30 [ 1080.697881] do_vfs_ioctl+0xcdb/0x12e0 [ 1080.701780] ? lock_downgrade+0x720/0x720 [ 1080.706125] ? check_preemption_disabled+0x41/0x280 [ 1080.711326] ? ioctl_preallocate+0x200/0x200 [ 1080.715754] ? __fget+0x356/0x510 [ 1080.719585] ? do_dup2+0x450/0x450 [ 1080.723137] ? vfs_write+0x393/0x540 [ 1080.726883] ? fput+0x2b/0x190 [ 1080.730095] ksys_ioctl+0x9b/0xc0 [ 1080.733649] __x64_sys_ioctl+0x6f/0xb0 [ 1080.737727] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1080.742603] do_syscall_64+0xf9/0x620 [ 1080.746433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1080.752333] RIP: 0033:0x465ef9 [ 1080.755539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1080.774713] RSP: 002b:00007f98c3cc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1080.782627] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 03:33:59 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 03:33:59 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:33:59 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x0) [ 1080.790032] RDX: 0000000020000b40 RSI: 00000000800448d3 RDI: 0000000000000004 [ 1080.797628] RBP: 00007f98c3cc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1080.804900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1080.812419] R13: 00007fff74ba6bdf R14: 00007f98c3cc0300 R15: 0000000000022000 03:33:59 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:33:59 executing program 1 (fault-call:2 fault-nth:1): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:59 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:33:59 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x541b, 0x0) 03:33:59 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2, 0x0) 03:33:59 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) [ 1081.037715] FAULT_INJECTION: forcing a failure. [ 1081.037715] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.069888] CPU: 1 PID: 8366 Comm: syz-executor.1 Not tainted 4.19.177-syzkaller #0 [ 1081.078255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:33:59 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x5421, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1081.087807] Call Trace: [ 1081.091730] dump_stack+0x1fc/0x2ef [ 1081.095402] should_fail.cold+0xa/0xf [ 1081.099229] ? setup_fault_attr+0x200/0x200 [ 1081.103736] ? lock_acquire+0x170/0x3c0 [ 1081.107725] __should_failslab+0x115/0x180 [ 1081.112854] should_failslab+0x5/0x10 [ 1081.114685] FAULT_INJECTION: forcing a failure. [ 1081.114685] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.116852] kmem_cache_alloc+0x277/0x370 [ 1081.116905] __anon_vma_prepare+0x2d3/0x560 [ 1081.116925] do_huge_pmd_anonymous_page+0x106e/0x1e60 [ 1081.116945] ? prep_transhuge_page+0xa0/0xa0 [ 1081.116962] ? mark_held_locks+0xf0/0xf0 [ 1081.116982] __handle_mm_fault+0x289c/0x41c0 [ 1081.117000] ? vm_insert_page+0x9c0/0x9c0 [ 1081.117029] ? check_preemption_disabled+0x41/0x280 [ 1081.117048] handle_mm_fault+0x436/0xb10 [ 1081.117066] __do_page_fault+0x68e/0xd60 [ 1081.117085] ? trace_hardirqs_off_caller+0x6e/0x210 03:33:59 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5421, 0x0) 03:33:59 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x541b, 0x0) [ 1081.117101] ? spurious_fault+0x840/0x840 [ 1081.117115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1081.117135] page_fault+0x1e/0x30 [ 1081.117150] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1081.117163] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1081.117172] RSP: 0018:ffff88806a2379a0 EFLAGS: 00010202 03:33:59 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1081.117183] RAX: 0000000000000004 RBX: 000000000000005c RCX: 000000000000005c [ 1081.117193] RDX: 000000000000005c RSI: 0000000020000b40 RDI: ffff88806a237a00 [ 1081.117202] RBP: 0000000020000b40 R08: 0000000000000001 R09: ffffed100d446f4b [ 1081.117209] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000020000b9c [ 1081.117219] R13: ffff88806a237a00 R14: 00007ffffffff000 R15: 0000000000000000 [ 1081.117246] _copy_from_user+0xfc/0x130 [ 1081.117265] hci_get_dev_info+0x82/0x6c0 [ 1081.117280] ? hci_get_dev_list+0x330/0x330 [ 1081.117295] ? hci_sock_ioctl+0x147/0x7d0 03:33:59 executing program 1 (fault-call:2 fault-nth:2): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) [ 1081.117314] ? lock_downgrade+0x720/0x720 [ 1081.117331] ? __local_bh_enable_ip+0x159/0x270 [ 1081.117352] hci_sock_ioctl+0x208/0x7d0 [ 1081.117369] ? hci_sock_release+0x590/0x590 [ 1081.117381] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1081.117396] ? finish_task_switch+0x146/0x760 [ 1081.117408] ? finish_task_switch+0x118/0x760 [ 1081.117422] ? switch_mm_irqs_off+0x764/0x1340 [ 1081.117458] sock_do_ioctl+0xcb/0x2d0 [ 1081.117472] ? compat_ifr_data_ioctl+0x150/0x150 [ 1081.117486] ? __lock_acquire+0x6de/0x3ff0 03:33:59 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x5450, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1081.117507] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1081.117522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1081.117542] sock_ioctl+0x2ef/0x5d0 [ 1081.117556] ? dlci_ioctl_set+0x30/0x30 [ 1081.117578] ? lock_release+0x429/0x8b0 [ 1081.117592] ? dlci_ioctl_set+0x30/0x30 [ 1081.117609] do_vfs_ioctl+0xcdb/0x12e0 [ 1081.117624] ? lock_downgrade+0x720/0x720 [ 1081.117638] ? check_preemption_disabled+0x41/0x280 [ 1081.117652] ? ioctl_preallocate+0x200/0x200 [ 1081.117671] ? __fget+0x356/0x510 [ 1081.117689] ? do_dup2+0x450/0x450 [ 1081.117702] ? vfs_write+0x393/0x540 [ 1081.117719] ? fput+0x2b/0x190 [ 1081.117739] ksys_ioctl+0x9b/0xc0 [ 1081.117756] __x64_sys_ioctl+0x6f/0xb0 [ 1081.117770] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1081.117784] do_syscall_64+0xf9/0x620 [ 1081.117800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.117811] RIP: 0033:0x465ef9 03:33:59 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x541b, 0x0) 03:33:59 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1081.117825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1081.117833] RSP: 002b:00007f98c3cc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1081.117846] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 1081.117855] RDX: 0000000020000b40 RSI: 00000000800448d3 RDI: 0000000000000004 [ 1081.117863] RBP: 00007f98c3cc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1081.117871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1081.117880] R13: 00007fff74ba6bdf R14: 00007f98c3cc0300 R15: 0000000000022000 [ 1081.417431] FAULT_INJECTION: forcing a failure. [ 1081.417431] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.471498] CPU: 0 PID: 8370 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 1081.508398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1081.518368] Call Trace: [ 1081.522105] dump_stack+0x1fc/0x2ef [ 1081.525745] should_fail.cold+0xa/0xf [ 1081.530780] ? setup_fault_attr+0x200/0x200 [ 1081.535112] ? mark_held_locks+0xf0/0xf0 [ 1081.539327] ? mark_held_locks+0xa6/0xf0 [ 1081.543591] __should_failslab+0x115/0x180 [ 1081.547848] should_failslab+0x5/0x10 [ 1081.551665] kmem_cache_alloc_node+0x54/0x3b0 [ 1081.556454] __alloc_skb+0x71/0x560 [ 1081.560281] create_monitor_ctrl_open+0x16c/0x670 [ 1081.565141] ? hci_sock_setsockopt+0x650/0x650 [ 1081.571056] ? security_capable+0x8f/0xc0 [ 1081.575228] hci_sock_ioctl+0x62c/0x7d0 [ 1081.579237] ? _parse_integer+0x180/0x180 [ 1081.583400] ? hci_sock_release+0x590/0x590 [ 1081.587822] ? __might_fault+0x192/0x1d0 [ 1081.592124] ? _copy_from_user+0xd2/0x130 [ 1081.596657] sock_do_ioctl+0xcb/0x2d0 [ 1081.600480] ? compat_ifr_data_ioctl+0x150/0x150 [ 1081.605266] ? __lock_acquire+0x6de/0x3ff0 [ 1081.609704] sock_ioctl+0x2ef/0x5d0 [ 1081.613361] ? dlci_ioctl_set+0x30/0x30 [ 1081.617364] ? ksys_write+0x241/0x2a0 [ 1081.621176] ? dlci_ioctl_set+0x30/0x30 [ 1081.625166] do_vfs_ioctl+0xcdb/0x12e0 [ 1081.629345] ? lock_downgrade+0x720/0x720 [ 1081.633604] ? check_preemption_disabled+0x41/0x280 [ 1081.638721] ? ioctl_preallocate+0x200/0x200 [ 1081.643177] ? __fget+0x356/0x510 [ 1081.647167] ? do_dup2+0x450/0x450 [ 1081.650807] ? vfs_write+0x393/0x540 [ 1081.654540] ? fput+0x2b/0x190 [ 1081.658007] ksys_ioctl+0x9b/0xc0 [ 1081.661479] __x64_sys_ioctl+0x6f/0xb0 [ 1081.665375] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1081.669966] do_syscall_64+0xf9/0x620 [ 1081.673778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.679410] RIP: 0033:0x465ef9 [ 1081.682620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1081.701795] RSP: 002b:00007f0f73d28188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1081.713177] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 1081.720629] RDX: 0000000020000b40 RSI: 00000000800448d3 RDI: 0000000000000004 [ 1081.727992] RBP: 00007f0f73d281d0 R08: 0000000000000000 R09: 0000000000000000 [ 1081.735273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1081.742759] R13: 00007ffde6f5e55f R14: 00007f0f73d28300 R15: 0000000000022000 [ 1081.766194] CPU: 1 PID: 8382 Comm: syz-executor.1 Not tainted 4.19.177-syzkaller #0 [ 1081.774225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1081.783693] Call Trace: [ 1081.786325] dump_stack+0x1fc/0x2ef [ 1081.790237] should_fail.cold+0xa/0xf [ 1081.794504] ? setup_fault_attr+0x200/0x200 [ 1081.798834] ? lock_acquire+0x170/0x3c0 [ 1081.802821] __should_failslab+0x115/0x180 [ 1081.807074] should_failslab+0x5/0x10 [ 1081.810979] kmem_cache_alloc+0x277/0x370 [ 1081.815146] __khugepaged_enter+0x34/0x380 [ 1081.819488] do_huge_pmd_anonymous_page+0x1090/0x1e60 [ 1081.824722] ? prep_transhuge_page+0xa0/0xa0 [ 1081.829317] ? mark_held_locks+0xf0/0xf0 [ 1081.833393] __handle_mm_fault+0x289c/0x41c0 [ 1081.838349] ? vm_insert_page+0x9c0/0x9c0 [ 1081.842694] ? check_preemption_disabled+0x41/0x280 [ 1081.847726] handle_mm_fault+0x436/0xb10 [ 1081.851828] __do_page_fault+0x68e/0xd60 [ 1081.855906] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1081.861098] ? spurious_fault+0x840/0x840 [ 1081.865778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1081.870832] page_fault+0x1e/0x30 [ 1081.874288] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1081.880160] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1081.899061] RSP: 0018:ffff888095d279a0 EFLAGS: 00010202 [ 1081.904982] RAX: 0000000000000004 RBX: 000000000000005c RCX: 000000000000005c [ 1081.912246] RDX: 000000000000005c RSI: 0000000020000b40 RDI: ffff888095d27a00 [ 1081.920688] RBP: 0000000020000b40 R08: 0000000000000001 R09: ffffed1012ba4f4b [ 1081.928126] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000020000b9c [ 1081.935558] R13: ffff888095d27a00 R14: 00007ffffffff000 R15: 0000000000000000 [ 1081.942838] _copy_from_user+0xfc/0x130 [ 1081.946805] hci_get_dev_info+0x82/0x6c0 [ 1081.950881] ? hci_get_dev_list+0x330/0x330 [ 1081.955205] ? hci_sock_ioctl+0x147/0x7d0 [ 1081.959633] ? lock_downgrade+0x720/0x720 [ 1081.963781] ? __local_bh_enable_ip+0x159/0x270 [ 1081.968454] hci_sock_ioctl+0x208/0x7d0 [ 1081.972420] ? _parse_integer+0x180/0x180 [ 1081.976579] ? hci_sock_release+0x590/0x590 [ 1081.981077] ? __might_fault+0x192/0x1d0 [ 1081.985136] ? _copy_from_user+0xd2/0x130 [ 1081.989287] sock_do_ioctl+0xcb/0x2d0 [ 1081.993101] ? compat_ifr_data_ioctl+0x150/0x150 [ 1081.997858] ? __lock_acquire+0x6de/0x3ff0 [ 1082.002086] sock_ioctl+0x2ef/0x5d0 [ 1082.005988] ? dlci_ioctl_set+0x30/0x30 [ 1082.009959] ? ksys_write+0x241/0x2a0 [ 1082.013770] ? dlci_ioctl_set+0x30/0x30 [ 1082.017736] do_vfs_ioctl+0xcdb/0x12e0 [ 1082.022998] ? lock_downgrade+0x720/0x720 [ 1082.027444] ? check_preemption_disabled+0x41/0x280 [ 1082.032577] ? ioctl_preallocate+0x200/0x200 [ 1082.037655] ? __fget+0x356/0x510 [ 1082.041850] ? do_dup2+0x450/0x450 [ 1082.046426] ? vfs_write+0x393/0x540 [ 1082.050147] ? fput+0x2b/0x190 [ 1082.053961] ksys_ioctl+0x9b/0xc0 [ 1082.057794] __x64_sys_ioctl+0x6f/0xb0 [ 1082.062118] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1082.066711] do_syscall_64+0xf9/0x620 [ 1082.070523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1082.076094] RIP: 0033:0x465ef9 [ 1082.079271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1082.098597] RSP: 002b:00007f98c3cc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1082.106317] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 1082.113573] RDX: 0000000020000b40 RSI: 00000000800448d3 RDI: 0000000000000004 [ 1082.122224] RBP: 00007f98c3cc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1082.129600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1082.137033] R13: 00007fff74ba6bdf R14: 00007f98c3cc0300 R15: 0000000000022000 03:34:00 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:34:00 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5450, 0x0) 03:34:00 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x5451, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:00 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:00 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x541b, 0x0) 03:34:00 executing program 1 (fault-call:2 fault-nth:3): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:34:00 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x5452, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1082.326765] FAULT_INJECTION: forcing a failure. [ 1082.326765] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1082.366665] FAULT_INJECTION: forcing a failure. 03:34:00 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5451, 0x0) 03:34:00 executing program 3: ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:00 executing program 0: r0 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x541b, 0x0) [ 1082.366665] name failslab, interval 1, probability 0, space 0, times 0 [ 1082.397966] CPU: 1 PID: 8415 Comm: syz-executor.1 Not tainted 4.19.177-syzkaller #0 [ 1082.406181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.416455] Call Trace: [ 1082.419211] dump_stack+0x1fc/0x2ef [ 1082.422857] should_fail.cold+0xa/0xf [ 1082.427404] ? lock_acquire+0x170/0x3c0 [ 1082.431576] ? setup_fault_attr+0x200/0x200 [ 1082.436012] __alloc_pages_nodemask+0x239/0x2890 [ 1082.441048] ? sock_do_ioctl+0xcb/0x2d0 [ 1082.445458] ? sock_ioctl+0x2ef/0x5d0 [ 1082.449601] ? do_vfs_ioctl+0xcdb/0x12e0 [ 1082.453820] ? ksys_ioctl+0x9b/0xc0 [ 1082.457457] ? __x64_sys_ioctl+0x6f/0xb0 [ 1082.462654] ? do_syscall_64+0xf9/0x620 [ 1082.466660] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1082.472094] ? __save_stack_trace+0x72/0x190 [ 1082.477129] ? deref_stack_reg+0x134/0x1d0 [ 1082.481485] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1082.486337] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 1082.492501] ? is_bpf_text_address+0xd5/0x1b0 [ 1082.497023] ? __khugepaged_enter+0x27e/0x380 [ 1082.502588] ? lock_downgrade+0x720/0x720 [ 1082.506832] ? lock_acquire+0x170/0x3c0 [ 1082.510819] ? __khugepaged_enter+0xcc/0x380 [ 1082.515354] alloc_pages_current+0x193/0x2a0 [ 1082.519860] pte_alloc_one+0x16/0x190 [ 1082.523778] do_huge_pmd_anonymous_page+0x649/0x1e60 [ 1082.528981] ? prep_transhuge_page+0xa0/0xa0 [ 1082.533414] ? mark_held_locks+0xf0/0xf0 [ 1082.537705] __handle_mm_fault+0x289c/0x41c0 [ 1082.542650] ? vm_insert_page+0x9c0/0x9c0 [ 1082.546826] ? check_preemption_disabled+0x41/0x280 [ 1082.551976] handle_mm_fault+0x436/0xb10 [ 1082.556353] __do_page_fault+0x68e/0xd60 [ 1082.560675] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1082.565709] ? spurious_fault+0x840/0x840 [ 1082.570245] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1082.575115] page_fault+0x1e/0x30 [ 1082.578584] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1082.584478] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1082.605179] RSP: 0018:ffff88806a3c79a0 EFLAGS: 00010202 [ 1082.611033] RAX: 0000000000000004 RBX: 000000000000005c RCX: 000000000000005c [ 1082.618406] RDX: 000000000000005c RSI: 0000000020000b40 RDI: ffff88806a3c7a00 [ 1082.625742] RBP: 0000000020000b40 R08: 0000000000000001 R09: ffffed100d478f4b [ 1082.633502] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000020000b9c [ 1082.640806] R13: ffff88806a3c7a00 R14: 00007ffffffff000 R15: 0000000000000000 [ 1082.648308] _copy_from_user+0xfc/0x130 [ 1082.652300] hci_get_dev_info+0x82/0x6c0 [ 1082.656378] ? hci_get_dev_list+0x330/0x330 [ 1082.660990] ? hci_sock_ioctl+0x147/0x7d0 [ 1082.665182] ? lock_downgrade+0x720/0x720 [ 1082.669366] ? __local_bh_enable_ip+0x159/0x270 [ 1082.674476] hci_sock_ioctl+0x208/0x7d0 [ 1082.678650] ? _parse_integer+0x180/0x180 [ 1082.682821] ? hci_sock_release+0x590/0x590 [ 1082.687478] ? __might_fault+0x192/0x1d0 [ 1082.691899] ? _copy_from_user+0xd2/0x130 [ 1082.696072] sock_do_ioctl+0xcb/0x2d0 [ 1082.699996] ? compat_ifr_data_ioctl+0x150/0x150 [ 1082.704859] ? __lock_acquire+0x6de/0x3ff0 [ 1082.709629] sock_ioctl+0x2ef/0x5d0 [ 1082.713363] ? dlci_ioctl_set+0x30/0x30 [ 1082.717388] ? ksys_write+0x241/0x2a0 [ 1082.722019] ? dlci_ioctl_set+0x30/0x30 [ 1082.726142] do_vfs_ioctl+0xcdb/0x12e0 [ 1082.730063] ? lock_downgrade+0x720/0x720 [ 1082.734309] ? check_preemption_disabled+0x41/0x280 [ 1082.739533] ? ioctl_preallocate+0x200/0x200 [ 1082.744511] ? __fget+0x356/0x510 [ 1082.748082] ? do_dup2+0x450/0x450 [ 1082.753370] ? vfs_write+0x393/0x540 [ 1082.757102] ? fput+0x2b/0x190 [ 1082.760412] ksys_ioctl+0x9b/0xc0 [ 1082.763883] __x64_sys_ioctl+0x6f/0xb0 [ 1082.769101] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1082.773801] do_syscall_64+0xf9/0x620 [ 1082.777619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1082.783638] RIP: 0033:0x465ef9 [ 1082.787045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1082.806921] RSP: 002b:00007f98c3cc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1082.814828] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 1082.822427] RDX: 0000000020000b40 RSI: 00000000800448d3 RDI: 0000000000000004 [ 1082.829713] RBP: 00007f98c3cc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1082.836995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 03:34:01 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5452, 0x0) 03:34:01 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x5460, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1082.844295] R13: 00007fff74ba6bdf R14: 00007f98c3cc0300 R15: 0000000000022000 [ 1082.851769] CPU: 0 PID: 8417 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 1082.859619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.869069] Call Trace: [ 1082.871701] dump_stack+0x1fc/0x2ef [ 1082.875339] should_fail.cold+0xa/0xf [ 1082.879149] ? setup_fault_attr+0x200/0x200 [ 1082.883667] ? setup_fault_attr+0x200/0x200 [ 1082.888088] ? mark_held_locks+0xf0/0xf0 [ 1082.892169] __should_failslab+0x115/0x180 [ 1082.896511] should_failslab+0x5/0x10 [ 1082.900338] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 1082.906508] __kmalloc_node_track_caller+0x38/0x70 [ 1082.913028] __alloc_skb+0xae/0x560 [ 1082.917489] create_monitor_ctrl_open+0x16c/0x670 [ 1082.923684] ? hci_sock_setsockopt+0x650/0x650 [ 1082.928485] ? security_capable+0x8f/0xc0 [ 1082.932660] hci_sock_ioctl+0x62c/0x7d0 [ 1082.936751] ? _parse_integer+0x180/0x180 [ 1082.941009] ? hci_sock_release+0x590/0x590 [ 1082.946340] ? __might_fault+0x192/0x1d0 [ 1082.950656] ? _copy_from_user+0xd2/0x130 [ 1082.955432] sock_do_ioctl+0xcb/0x2d0 [ 1082.959250] ? compat_ifr_data_ioctl+0x150/0x150 [ 1082.964194] ? __lock_acquire+0x6de/0x3ff0 [ 1082.968454] sock_ioctl+0x2ef/0x5d0 [ 1082.972111] ? dlci_ioctl_set+0x30/0x30 [ 1082.976102] ? ksys_write+0x241/0x2a0 [ 1082.979918] ? dlci_ioctl_set+0x30/0x30 [ 1082.983915] do_vfs_ioctl+0xcdb/0x12e0 [ 1082.987822] ? lock_downgrade+0x720/0x720 [ 1082.991977] ? check_preemption_disabled+0x41/0x280 [ 1082.997103] ? ioctl_preallocate+0x200/0x200 [ 1083.002500] ? __fget+0x356/0x510 [ 1083.005944] ? do_dup2+0x450/0x450 [ 1083.009502] ? vfs_write+0x393/0x540 [ 1083.014257] ? fput+0x2b/0x190 [ 1083.017441] ksys_ioctl+0x9b/0xc0 [ 1083.020885] __x64_sys_ioctl+0x6f/0xb0 [ 1083.024899] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1083.030947] do_syscall_64+0xf9/0x620 [ 1083.034777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.040579] RIP: 0033:0x465ef9 [ 1083.044945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.064229] RSP: 002b:00007f0f73d28188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1083.072377] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 1083.079861] RDX: 0000000020000b40 RSI: 00000000800448d3 RDI: 0000000000000004 [ 1083.087879] RBP: 00007f0f73d281d0 R08: 0000000000000000 R09: 0000000000000000 [ 1083.095590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1083.103744] R13: 00007ffde6f5e55f R14: 00007f0f73d28300 R15: 0000000000022000 03:34:01 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:34:01 executing program 0: r0 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x541b, 0x0) 03:34:01 executing program 1 (fault-call:2 fault-nth:4): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:34:01 executing program 3: ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:01 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x40045612, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:01 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x40049409, 0x0) 03:34:01 executing program 0: r0 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x541b, 0x0) 03:34:01 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x4020940d, 0x0) [ 1083.324892] FAULT_INJECTION: forcing a failure. [ 1083.324892] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.348978] FAULT_INJECTION: forcing a failure. [ 1083.348978] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.386443] CPU: 0 PID: 8455 Comm: syz-executor.1 Not tainted 4.19.177-syzkaller #0 [ 1083.394482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.404454] Call Trace: [ 1083.407066] dump_stack+0x1fc/0x2ef [ 1083.410730] should_fail.cold+0xa/0xf [ 1083.414758] ? setup_fault_attr+0x200/0x200 [ 1083.419456] ? lock_acquire+0x170/0x3c0 [ 1083.423622] __should_failslab+0x115/0x180 [ 1083.428155] should_failslab+0x5/0x10 [ 1083.431993] kmem_cache_alloc+0x277/0x370 03:34:01 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0xc0045878, 0x0) [ 1083.436340] ptlock_alloc+0x1d/0x70 [ 1083.440599] pte_alloc_one+0x68/0x190 [ 1083.446764] do_huge_pmd_anonymous_page+0x649/0x1e60 [ 1083.451920] ? prep_transhuge_page+0xa0/0xa0 [ 1083.456372] ? mark_held_locks+0xf0/0xf0 [ 1083.460545] __handle_mm_fault+0x289c/0x41c0 [ 1083.465324] ? vm_insert_page+0x9c0/0x9c0 [ 1083.469604] ? check_preemption_disabled+0x41/0x280 [ 1083.474934] handle_mm_fault+0x436/0xb10 [ 1083.479108] __do_page_fault+0x68e/0xd60 [ 1083.483191] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1083.488353] ? spurious_fault+0x840/0x840 [ 1083.492718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1083.497583] page_fault+0x1e/0x30 [ 1083.501094] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1083.507536] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1083.526789] RSP: 0018:ffff8880a4cb79a0 EFLAGS: 00010202 [ 1083.532912] RAX: 0000000000000004 RBX: 000000000000005c RCX: 000000000000005c [ 1083.540207] RDX: 000000000000005c RSI: 0000000020000b40 RDI: ffff8880a4cb7a00 [ 1083.547923] RBP: 0000000020000b40 R08: 0000000000000001 R09: ffffed1014996f4b [ 1083.555208] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000020000b9c [ 1083.562576] R13: ffff8880a4cb7a00 R14: 00007ffffffff000 R15: 0000000000000000 [ 1083.569886] _copy_from_user+0xfc/0x130 [ 1083.573873] hci_get_dev_info+0x82/0x6c0 [ 1083.578136] ? hci_get_dev_list+0x330/0x330 [ 1083.582576] ? hci_sock_ioctl+0x147/0x7d0 03:34:02 executing program 3: ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1083.586742] ? lock_downgrade+0x720/0x720 [ 1083.590905] ? __local_bh_enable_ip+0x159/0x270 [ 1083.595855] hci_sock_ioctl+0x208/0x7d0 [ 1083.599843] ? _parse_integer+0x180/0x180 [ 1083.604003] ? hci_sock_release+0x590/0x590 [ 1083.608720] ? __might_fault+0x192/0x1d0 [ 1083.612795] ? _copy_from_user+0xd2/0x130 [ 1083.617001] sock_do_ioctl+0xcb/0x2d0 [ 1083.620824] ? compat_ifr_data_ioctl+0x150/0x150 [ 1083.625713] ? __lock_acquire+0x6de/0x3ff0 [ 1083.630088] sock_ioctl+0x2ef/0x5d0 [ 1083.634102] ? dlci_ioctl_set+0x30/0x30 [ 1083.638099] ? ksys_write+0x241/0x2a0 [ 1083.642008] ? dlci_ioctl_set+0x30/0x30 [ 1083.646693] do_vfs_ioctl+0xcdb/0x12e0 [ 1083.651476] ? lock_downgrade+0x720/0x720 [ 1083.655729] ? check_preemption_disabled+0x41/0x280 [ 1083.660932] ? ioctl_preallocate+0x200/0x200 [ 1083.665544] ? __fget+0x356/0x510 [ 1083.669013] ? do_dup2+0x450/0x450 [ 1083.672578] ? vfs_write+0x393/0x540 [ 1083.676924] ? fput+0x2b/0x190 [ 1083.680132] ksys_ioctl+0x9b/0xc0 [ 1083.683780] __x64_sys_ioctl+0x6f/0xb0 [ 1083.688197] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1083.693133] do_syscall_64+0xf9/0x620 [ 1083.696947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.702338] RIP: 0033:0x465ef9 [ 1083.706100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.727659] RSP: 002b:00007f98c3cc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1083.735639] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 1083.743278] RDX: 0000000020000b40 RSI: 00000000800448d3 RDI: 0000000000000004 [ 1083.751000] RBP: 00007f98c3cc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1083.759746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1083.767034] R13: 00007fff74ba6bdf R14: 00007f98c3cc0300 R15: 0000000000022000 [ 1083.775751] CPU: 1 PID: 8459 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 1083.784178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.794678] Call Trace: [ 1083.797462] dump_stack+0x1fc/0x2ef [ 1083.801131] should_fail.cold+0xa/0xf [ 1083.806540] ? setup_fault_attr+0x200/0x200 [ 1083.811180] ? lock_acquire+0x170/0x3c0 [ 1083.815521] __should_failslab+0x115/0x180 [ 1083.820180] should_failslab+0x5/0x10 [ 1083.824487] kmem_cache_alloc+0x277/0x370 [ 1083.828647] __anon_vma_prepare+0x5d/0x560 [ 1083.832950] do_huge_pmd_anonymous_page+0x106e/0x1e60 [ 1083.838711] ? prep_transhuge_page+0xa0/0xa0 [ 1083.843797] ? deref_stack_reg+0x134/0x1d0 [ 1083.848061] ? mark_held_locks+0xf0/0xf0 [ 1083.852144] __handle_mm_fault+0x289c/0x41c0 [ 1083.857552] ? __bpf_address_lookup+0x330/0x330 [ 1083.862240] ? vm_insert_page+0x9c0/0x9c0 [ 1083.866783] ? check_preemption_disabled+0x41/0x280 [ 1083.872005] handle_mm_fault+0x436/0xb10 [ 1083.876257] __do_page_fault+0x68e/0xd60 [ 1083.880776] ? trace_hardirqs_off_caller+0x6e/0x210 03:34:02 executing program 0: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x541b, 0x0) [ 1083.885807] ? spurious_fault+0x840/0x840 [ 1083.890010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1083.894873] page_fault+0x1e/0x30 [ 1083.898436] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1083.904312] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1083.924996] RSP: 0018:ffff8880b392f9a0 EFLAGS: 00010202 [ 1083.931161] RAX: 0000000000000004 RBX: 000000000000005c RCX: 000000000000005c [ 1083.938603] RDX: 000000000000005c RSI: 0000000020000b40 RDI: ffff8880b392fa00 [ 1083.946023] RBP: 0000000020000b40 R08: 0000000000000001 R09: ffffed1016725f4b [ 1083.953983] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000020000b9c [ 1083.961378] R13: ffff8880b392fa00 R14: 00007ffffffff000 R15: 0000000000000000 [ 1083.968701] _copy_from_user+0xfc/0x130 [ 1083.972677] hci_get_dev_info+0x82/0x6c0 [ 1083.976756] ? hci_get_dev_list+0x330/0x330 [ 1083.981270] ? hci_sock_ioctl+0x147/0x7d0 [ 1083.985425] ? lock_downgrade+0x720/0x720 [ 1083.989578] ? __local_bh_enable_ip+0x159/0x270 [ 1083.994249] hci_sock_ioctl+0x208/0x7d0 [ 1083.998732] ? _parse_integer+0x180/0x180 [ 1084.003018] ? hci_sock_release+0x590/0x590 [ 1084.007344] ? __might_fault+0x192/0x1d0 [ 1084.011523] ? _copy_from_user+0xd2/0x130 [ 1084.015762] sock_do_ioctl+0xcb/0x2d0 [ 1084.019577] ? compat_ifr_data_ioctl+0x150/0x150 [ 1084.024612] ? __lock_acquire+0x6de/0x3ff0 [ 1084.029141] sock_ioctl+0x2ef/0x5d0 [ 1084.032760] ? dlci_ioctl_set+0x30/0x30 [ 1084.036769] ? ksys_write+0x241/0x2a0 [ 1084.040585] ? dlci_ioctl_set+0x30/0x30 [ 1084.044748] do_vfs_ioctl+0xcdb/0x12e0 [ 1084.048850] ? lock_downgrade+0x720/0x720 [ 1084.053756] ? check_preemption_disabled+0x41/0x280 [ 1084.059807] ? ioctl_preallocate+0x200/0x200 [ 1084.066667] ? __fget+0x356/0x510 [ 1084.070121] ? do_dup2+0x450/0x450 [ 1084.073659] ? vfs_write+0x393/0x540 [ 1084.077786] ? fput+0x2b/0x190 [ 1084.081254] ksys_ioctl+0x9b/0xc0 [ 1084.084941] __x64_sys_ioctl+0x6f/0xb0 [ 1084.089019] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1084.094378] do_syscall_64+0xf9/0x620 [ 1084.098480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.105873] RIP: 0033:0x465ef9 [ 1084.109260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.129824] RSP: 002b:00007f0f73d28188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:34:02 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x40045613, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1084.139255] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 1084.147239] RDX: 0000000020000b40 RSI: 00000000800448d3 RDI: 0000000000000004 [ 1084.155206] RBP: 00007f0f73d281d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.162746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1084.170588] R13: 00007ffde6f5e55f R14: 00007f0f73d28300 R15: 0000000000022000 03:34:02 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:34:02 executing program 1 (fault-call:2 fault-nth:5): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:34:02 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:02 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0xc0045878, 0x0) 03:34:02 executing program 0: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x541b, 0x0) 03:34:02 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x40049409, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1084.430561] FAULT_INJECTION: forcing a failure. [ 1084.430561] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1084.465011] CPU: 1 PID: 8496 Comm: syz-executor.1 Not tainted 4.19.177-syzkaller #0 03:34:02 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x2, &(0x7f0000000b40)) [ 1084.472854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.482684] Call Trace: [ 1084.485403] dump_stack+0x1fc/0x2ef [ 1084.490104] should_fail.cold+0xa/0xf [ 1084.494003] ? setup_fault_attr+0x200/0x200 [ 1084.499118] ? __save_stack_trace+0xaf/0x190 [ 1084.503677] __alloc_pages_nodemask+0x239/0x2890 [ 1084.508468] ? kasan_kmalloc+0x139/0x160 [ 1084.512575] ? kmem_cache_alloc+0x122/0x370 [ 1084.516951] ? ptlock_alloc+0x1d/0x70 [ 1084.520784] ? pte_alloc_one+0x68/0x190 [ 1084.525215] ? do_huge_pmd_anonymous_page+0x649/0x1e60 [ 1084.531479] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1084.536694] ? mark_held_locks+0xf0/0xf0 [ 1084.540882] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1084.546006] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 1084.551996] ? is_bpf_text_address+0xd5/0x1b0 [ 1084.556781] ? should_fail+0x142/0x7b0 [ 1084.561028] ? fs_reclaim_release+0xd0/0x110 [ 1084.565535] ? setup_fault_attr+0x200/0x200 [ 1084.569952] ? lock_acquire+0x170/0x3c0 [ 1084.574583] alloc_pages_vma+0x461/0x780 [ 1084.578949] do_huge_pmd_wp_page+0x9b9/0x5260 [ 1084.583582] ? __lock_acquire+0x6de/0x3ff0 [ 1084.589021] ? __split_huge_pmd+0x4360/0x4360 [ 1084.593913] ? prep_transhuge_page+0xa0/0xa0 [ 1084.598346] ? mark_held_locks+0xf0/0xf0 [ 1084.611317] __handle_mm_fault+0x2297/0x41c0 [ 1084.615752] ? vm_insert_page+0x9c0/0x9c0 [ 1084.619931] ? check_preemption_disabled+0x41/0x280 [ 1084.625314] handle_mm_fault+0x436/0xb10 03:34:03 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5421, &(0x7f0000000b40)) [ 1084.629399] __do_page_fault+0x68e/0xd60 [ 1084.633862] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1084.639078] ? spurious_fault+0x840/0x840 [ 1084.643242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1084.648974] page_fault+0x1e/0x30 [ 1084.652527] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1084.658435] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1084.678608] RSP: 0018:ffff888094fcf9a0 EFLAGS: 00010202 [ 1084.683985] RAX: 0000000000000004 RBX: 000000000000005c RCX: 000000000000005c [ 1084.691281] RDX: 000000000000005c RSI: ffff888094fcfa00 RDI: 0000000020000b40 [ 1084.699300] RBP: ffff888094fcfa00 R08: 0000000000000000 R09: ffffed10129f9f4b [ 1084.706757] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000020000b40 [ 1084.714562] R13: 0000000020000b9c R14: 00007ffffffff000 R15: 0000000000000000 [ 1084.722004] _copy_to_user+0xe2/0x100 [ 1084.726619] hci_get_dev_info+0x40c/0x6c0 [ 1084.730877] ? hci_get_dev_list+0x330/0x330 [ 1084.735222] ? hci_sock_ioctl+0x147/0x7d0 [ 1084.739583] ? __local_bh_enable_ip+0x159/0x270 [ 1084.744588] hci_sock_ioctl+0x208/0x7d0 [ 1084.748602] ? _parse_integer+0x180/0x180 [ 1084.752980] ? hci_sock_release+0x590/0x590 [ 1084.757817] ? __might_fault+0x192/0x1d0 [ 1084.761979] ? _copy_from_user+0xd2/0x130 [ 1084.766149] sock_do_ioctl+0xcb/0x2d0 [ 1084.770094] ? compat_ifr_data_ioctl+0x150/0x150 [ 1084.775470] ? __lock_acquire+0x6de/0x3ff0 03:34:03 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5450, &(0x7f0000000b40)) [ 1084.780055] sock_ioctl+0x2ef/0x5d0 [ 1084.783696] ? dlci_ioctl_set+0x30/0x30 [ 1084.788186] ? ksys_write+0x241/0x2a0 [ 1084.792090] ? dlci_ioctl_set+0x30/0x30 [ 1084.796077] do_vfs_ioctl+0xcdb/0x12e0 [ 1084.800073] ? lock_downgrade+0x720/0x720 [ 1084.804505] ? check_preemption_disabled+0x41/0x280 [ 1084.810058] ? ioctl_preallocate+0x200/0x200 [ 1084.814781] ? __fget+0x356/0x510 [ 1084.818436] ? do_dup2+0x450/0x450 [ 1084.822088] ? vfs_write+0x393/0x540 [ 1084.825834] ? fput+0x2b/0x190 [ 1084.829348] ksys_ioctl+0x9b/0xc0 [ 1084.832916] __x64_sys_ioctl+0x6f/0xb0 [ 1084.836816] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1084.841534] do_syscall_64+0xf9/0x620 [ 1084.845543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.850868] RIP: 0033:0x465ef9 [ 1084.854080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.874060] RSP: 002b:00007f98c3cc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:34:03 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5451, &(0x7f0000000b40)) 03:34:03 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0xc0189436, 0x0) 03:34:03 executing program 0: syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x541b, 0x0) 03:34:03 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1084.882406] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 1084.890221] RDX: 0000000020000b40 RSI: 00000000800448d3 RDI: 0000000000000004 [ 1084.898006] RBP: 00007f98c3cc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.908108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1084.915473] R13: 00007fff74ba6bdf R14: 00007f98c3cc0300 R15: 0000000000022000 03:34:03 executing program 1 (fault-call:2 fault-nth:6): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:34:03 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x4020940d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:03 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:03 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5452, &(0x7f0000000b40)) 03:34:03 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0xc020660b, 0x0) 03:34:03 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5421, &(0x7f0000000b40)) 03:34:03 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0045878, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:03 executing program 3: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:03 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f0000000b40)) 03:34:03 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5460, &(0x7f0000000b40)) 03:34:03 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x4000) 03:34:03 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5421, &(0x7f0000000b40)) 03:34:03 executing program 3: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:03 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0045878, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:03 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8901, &(0x7f0000000b40)) 03:34:03 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x2, &(0x7f0000000b40)) 03:34:03 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x5400) 03:34:03 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5421, &(0x7f0000000b40)) 03:34:04 executing program 3: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0x2, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:04 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8902, &(0x7f0000000b40)) 03:34:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x5421, &(0x7f0000000b40)) 03:34:04 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0145608, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:04 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x5500) 03:34:04 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8903, &(0x7f0000000b40)) 03:34:04 executing program 0: ioctl$sock_bt_hci(0xffffffffffffffff, 0x5421, &(0x7f0000000b40)) 03:34:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x5450, &(0x7f0000000b40)) 03:34:04 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, 0x0) 03:34:04 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x9700) 03:34:04 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0189436, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:04 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8904, &(0x7f0000000b40)) 03:34:04 executing program 0: ioctl$sock_bt_hci(0xffffffffffffffff, 0x5421, &(0x7f0000000b40)) 03:34:04 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, 0x0) 03:34:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x5451, &(0x7f0000000b40)) 03:34:04 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x104000) 03:34:04 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0205647, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:04 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8940, &(0x7f0000000b40)) 03:34:04 executing program 0: ioctl$sock_bt_hci(0xffffffffffffffff, 0x5421, &(0x7f0000000b40)) 03:34:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x5452, &(0x7f0000000b40)) 03:34:04 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, 0x0) 03:34:04 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x400000) 03:34:04 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8941, &(0x7f0000000b40)) 03:34:04 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0205649, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:04 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x5421, &(0x7f0000000b40)) 03:34:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x5460, &(0x7f0000000b40)) 03:34:04 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:04 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x401000) 03:34:04 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x5421, &(0x7f0000000b40)) 03:34:04 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc020660b, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:04 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x894c, &(0x7f0000000b40)) 03:34:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x8901, &(0x7f0000000b40)) 03:34:04 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x4af000) 03:34:04 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:04 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8980, &(0x7f0000000b40)) 03:34:04 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x894c, &(0x7f0000000b40)) 03:34:04 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x5421, &(0x7f0000000b40)) 03:34:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x8902, &(0x7f0000000b40)) 03:34:05 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:05 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x4fc000) 03:34:05 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8981, &(0x7f0000000b40)) 03:34:05 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8980, &(0x7f0000000b40)) 03:34:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:34:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x8903, &(0x7f0000000b40)) 03:34:05 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x540000) 03:34:05 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8980, &(0x7f0000000b40)) 03:34:05 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0405610, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:05 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8982, &(0x7f0000000b40)) 03:34:05 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x550000) 03:34:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:34:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x8904, &(0x7f0000000b40)) 03:34:05 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8980, &(0x7f0000000b40)) 03:34:05 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0585609, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:05 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8983, &(0x7f0000000b40)) 03:34:05 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5460, 0x970000) 03:34:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000b40)) 03:34:05 executing program 3: ioctl$sock_bt_hci(0xffffffffffffffff, 0x8980, &(0x7f0000000b40)) 03:34:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x8940, &(0x7f0000000b40)) 03:34:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5421, 0x0) 03:34:05 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x89a0, &(0x7f0000000b40)) 03:34:05 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) 03:34:05 executing program 3: ioctl$sock_bt_hci(0xffffffffffffffff, 0x8980, &(0x7f0000000b40)) 03:34:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5421, 0x0) 03:34:05 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x89a1, &(0x7f0000000b40)) 03:34:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) ioctl$sock_bt_hci(r0, 0x8941, &(0x7f0000000b40)) 03:34:05 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0585611, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "90e5df12"}, 0x0, 0x0, @fd}) [ 1087.792583] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1087.802204] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1087.814554] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1087.821965] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1087.832538] device bridge_slave_1 left promiscuous mode [ 1087.838701] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.851259] device bridge_slave_0 left promiscuous mode [ 1087.857766] bridge0: port 1(bridge_slave_0) entered disabled state [ 1087.873354] device veth1_macvtap left promiscuous mode [ 1087.879028] device veth0_macvtap left promiscuous mode [ 1087.884428] device veth1_vlan left promiscuous mode [ 1087.890014] device veth0_vlan left promiscuous mode [ 1087.982469] device hsr_slave_1 left promiscuous mode [ 1087.996917] device hsr_slave_0 left promiscuous mode [ 1088.016081] team0 (unregistering): Port device team_slave_1 removed [ 1088.026867] team0 (unregistering): Port device team_slave_0 removed [ 1088.037732] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1088.051876] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1088.084525] bond0 (unregistering): Released all slaves [ 1089.708870] IPVS: ftp: loaded support on port[0] = 21 [ 1089.847824] chnl_net:caif_netlink_parms(): no params data found [ 1089.913675] bridge0: port 1(bridge_slave_0) entered blocking state [ 1089.920593] bridge0: port 1(bridge_slave_0) entered disabled state [ 1089.929612] device bridge_slave_0 entered promiscuous mode [ 1089.937818] bridge0: port 2(bridge_slave_1) entered blocking state [ 1089.945432] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.952848] device bridge_slave_1 entered promiscuous mode [ 1089.971963] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1089.982300] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1090.002331] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1090.010201] team0: Port device team_slave_0 added [ 1090.016338] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1090.023750] team0: Port device team_slave_1 added [ 1090.040948] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1090.047907] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1090.074266] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1090.087652] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1090.094611] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1090.120159] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1090.131867] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1090.139876] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1090.160953] device hsr_slave_0 entered promiscuous mode [ 1090.167056] device hsr_slave_1 entered promiscuous mode [ 1090.173813] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1090.183303] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1090.257812] bridge0: port 2(bridge_slave_1) entered blocking state [ 1090.264311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1090.271392] bridge0: port 1(bridge_slave_0) entered blocking state [ 1090.278061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1090.314466] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1090.321636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1090.331875] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1090.341094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1090.349387] bridge0: port 1(bridge_slave_0) entered disabled state [ 1090.357617] bridge0: port 2(bridge_slave_1) entered disabled state [ 1090.364646] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1090.377452] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1090.383936] 8021q: adding VLAN 0 to HW filter on device team0 [ 1090.393493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1090.401959] bridge0: port 1(bridge_slave_0) entered blocking state [ 1090.408531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1090.425649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1090.433606] bridge0: port 2(bridge_slave_1) entered blocking state [ 1090.440054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1090.450858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1090.461470] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1090.481025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1090.489085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1090.497525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1090.507695] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1090.514099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1090.530771] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1090.538462] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1090.549075] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1090.561078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1090.576692] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1090.589052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1090.624666] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1090.632400] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1090.639508] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1090.650904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1090.659884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1090.668859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1090.678523] device veth0_vlan entered promiscuous mode [ 1090.691284] device veth1_vlan entered promiscuous mode [ 1090.697350] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1090.707886] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1090.720547] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1090.731235] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1090.739303] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1090.748751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1090.759674] device veth0_macvtap entered promiscuous mode [ 1090.767263] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1090.776861] device veth1_macvtap entered promiscuous mode [ 1090.787820] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1090.798384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1090.809764] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1090.820003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1090.829787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1090.839628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1090.848858] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1090.859084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1090.868419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1090.878388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1090.893132] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1090.903801] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1090.916041] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1090.924149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1090.933256] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1090.943102] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1090.953985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1090.964481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1090.974734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1090.985309] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1090.999887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1091.009418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1091.019972] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1091.029712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1091.040272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1091.051140] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1091.058509] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1091.066456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1091.074557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1091.200005] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1091.210361] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1091.219413] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1091.241034] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1091.255916] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1091.262631] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1091.270873] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1091.279262] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1093.379959] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1093.388015] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1093.397498] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1093.404549] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1093.413170] device bridge_slave_1 left promiscuous mode [ 1093.419465] bridge0: port 2(bridge_slave_1) entered disabled state [ 1093.428061] device bridge_slave_0 left promiscuous mode [ 1093.433833] bridge0: port 1(bridge_slave_0) entered disabled state [ 1093.445256] device veth1_macvtap left promiscuous mode [ 1093.450907] device veth0_macvtap left promiscuous mode [ 1093.457073] device veth1_vlan left promiscuous mode [ 1093.462131] device veth0_vlan left promiscuous mode [ 1095.914914] Bluetooth: hci4: command 0x0409 tx timeout [ 1097.929895] device hsr_slave_1 left promiscuous mode [ 1097.937968] device hsr_slave_0 left promiscuous mode [ 1097.956553] team0 (unregistering): Port device team_slave_1 removed [ 1097.969796] team0 (unregistering): Port device team_slave_0 removed [ 1097.978980] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1097.990117] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1097.997504] Bluetooth: hci4: command 0x041b tx timeout [ 1098.029297] bond0 (unregistering): Released all slaves [ 1098.044220] IPVS: ftp: loaded support on port[0] = 21 [ 1098.155170] chnl_net:caif_netlink_parms(): no params data found [ 1098.243707] bridge0: port 1(bridge_slave_0) entered blocking state [ 1098.251870] bridge0: port 1(bridge_slave_0) entered disabled state [ 1098.259993] device bridge_slave_0 entered promiscuous mode [ 1098.267985] bridge0: port 2(bridge_slave_1) entered blocking state [ 1098.275294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1098.284176] device bridge_slave_1 entered promiscuous mode [ 1098.311982] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1098.322880] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1098.348799] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1098.357678] team0: Port device team_slave_0 added [ 1098.364610] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1098.373017] team0: Port device team_slave_1 added [ 1098.397605] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1098.403966] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1098.430423] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1098.443124] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1098.450719] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1098.477542] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1098.490033] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1098.498226] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1098.525216] device hsr_slave_0 entered promiscuous mode [ 1098.531819] device hsr_slave_1 entered promiscuous mode [ 1098.538988] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1098.546989] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1098.653303] bridge0: port 2(bridge_slave_1) entered blocking state [ 1098.659761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1098.666824] bridge0: port 1(bridge_slave_0) entered blocking state [ 1098.673235] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1098.726434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1098.736644] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1098.748394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1098.756364] bridge0: port 1(bridge_slave_0) entered disabled state [ 1098.764093] bridge0: port 2(bridge_slave_1) entered disabled state [ 1098.782679] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1098.791911] 8021q: adding VLAN 0 to HW filter on device team0 [ 1098.814481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1098.828328] bridge0: port 1(bridge_slave_0) entered blocking state [ 1098.835331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1098.855969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1098.863715] bridge0: port 2(bridge_slave_1) entered blocking state [ 1098.870147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1098.901554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1098.916924] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1098.950476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1098.958605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1098.976437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1098.987028] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1098.993535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1099.024395] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1099.039902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1099.050122] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1099.069239] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1099.098516] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1099.114109] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1099.128387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1099.140854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1099.218972] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1099.227450] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1099.234382] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1099.251737] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1099.259386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1099.272927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1099.285597] device veth0_vlan entered promiscuous mode [ 1099.302391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1099.310608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1099.327333] device veth1_vlan entered promiscuous mode [ 1099.333720] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1099.351630] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1099.380125] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1099.392784] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1099.402474] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1099.410777] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1099.418989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1099.428364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1099.446651] device veth0_macvtap entered promiscuous mode [ 1099.453457] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1099.463032] device veth1_macvtap entered promiscuous mode [ 1099.470828] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1099.481505] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1099.493512] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1099.506482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1099.516650] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1099.526363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1099.537057] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1099.547126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1099.558581] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1099.568834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1099.579234] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1099.588525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1099.598489] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1099.609743] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1099.616957] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1099.626382] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1099.633917] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1099.641689] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1099.651133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1099.662096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1099.672263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1099.683165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1099.695753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1099.706559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1099.717433] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1099.727006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1099.737967] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1099.747775] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1099.758418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1099.768902] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1099.776845] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1099.784023] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1099.793017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1099.938078] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1099.951738] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1099.967480] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1099.978947] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1100.004175] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1100.011190] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1100.018992] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1100.026742] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1100.075021] Bluetooth: hci4: command 0x040f tx timeout [ 1102.061613] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1102.069038] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1102.078148] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1102.085015] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1102.094071] device bridge_slave_1 left promiscuous mode [ 1102.100357] bridge0: port 2(bridge_slave_1) entered disabled state [ 1102.108457] device bridge_slave_0 left promiscuous mode [ 1102.113934] bridge0: port 1(bridge_slave_0) entered disabled state [ 1102.124083] device veth1_macvtap left promiscuous mode [ 1102.129615] device veth0_macvtap left promiscuous mode [ 1102.136694] device veth1_vlan left promiscuous mode [ 1102.141950] device veth0_vlan left promiscuous mode [ 1104.634857] Bluetooth: hci4: command 0x0409 tx timeout [ 1106.600594] device hsr_slave_1 left promiscuous mode [ 1106.608879] device hsr_slave_0 left promiscuous mode [ 1106.624590] team0 (unregistering): Port device team_slave_1 removed [ 1106.638739] team0 (unregistering): Port device team_slave_0 removed [ 1106.649167] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1106.659564] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1106.693543] bond0 (unregistering): Released all slaves [ 1106.709752] IPVS: ftp: loaded support on port[0] = 21 [ 1106.715485] Bluetooth: hci4: command 0x041b tx timeout [ 1106.844179] chnl_net:caif_netlink_parms(): no params data found [ 1106.967872] bridge0: port 1(bridge_slave_0) entered blocking state [ 1106.979248] bridge0: port 1(bridge_slave_0) entered disabled state [ 1106.989540] device bridge_slave_0 entered promiscuous mode [ 1107.001418] bridge0: port 2(bridge_slave_1) entered blocking state [ 1107.010311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1107.022024] device bridge_slave_1 entered promiscuous mode [ 1107.061444] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1107.074168] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1107.111307] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1107.124551] team0: Port device team_slave_0 added [ 1107.137380] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1107.150027] team0: Port device team_slave_1 added [ 1107.182410] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1107.192519] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1107.228840] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1107.244211] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1107.258010] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1107.294264] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1107.312758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1107.322176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1107.362643] device hsr_slave_0 entered promiscuous mode [ 1107.374234] device hsr_slave_1 entered promiscuous mode [ 1107.384427] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1107.399402] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1107.544631] bridge0: port 2(bridge_slave_1) entered blocking state [ 1107.551292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1107.558094] bridge0: port 1(bridge_slave_0) entered blocking state [ 1107.564666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1107.686627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1107.698189] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1107.710962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1107.719974] bridge0: port 1(bridge_slave_0) entered disabled state [ 1107.728294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1107.742098] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1107.750140] 8021q: adding VLAN 0 to HW filter on device team0 [ 1107.761389] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1107.770245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1107.779453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1107.793874] bridge0: port 1(bridge_slave_0) entered blocking state [ 1107.800306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1107.817798] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1107.827262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1107.836623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1107.844438] bridge0: port 2(bridge_slave_1) entered blocking state [ 1107.851091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1107.862096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1107.870807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1107.881519] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1107.890295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1107.901969] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1107.910095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1107.920211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1107.931474] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1107.940665] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1107.948809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1107.957353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1107.968917] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1107.977432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1107.987534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1108.000816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1108.008430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1108.016779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1108.029009] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1108.035254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1108.051976] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1108.059804] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1108.067064] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1108.073815] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1108.088501] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1108.103770] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1108.115729] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1108.122975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1108.131774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1108.167399] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1108.174584] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1108.182041] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1108.193080] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1108.200380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1108.209435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1108.217779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1108.226043] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1108.234571] device veth0_vlan entered promiscuous mode [ 1108.245683] device veth1_vlan entered promiscuous mode [ 1108.252179] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1108.261608] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1108.273800] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1108.284737] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1108.292295] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1108.300711] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1108.308687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1108.316884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1108.328807] device veth0_macvtap entered promiscuous mode [ 1108.335689] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1108.344347] device veth1_macvtap entered promiscuous mode [ 1108.351049] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1108.360772] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1108.370680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1108.381118] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1108.391709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1108.401441] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1108.411512] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1108.421308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1108.431601] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1108.440880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1108.451597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1108.461310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1108.471807] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1108.483156] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1108.491307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1108.499269] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1108.507136] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1108.514334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1108.522787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1108.532827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1108.543800] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1108.553778] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1108.564082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1108.573621] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1108.583575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1108.592880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1108.604255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1108.616312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1108.626835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1108.637767] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1108.644737] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1108.653000] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1108.661696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1108.781580] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1108.795376] Bluetooth: hci4: command 0x040f tx timeout [ 1108.813356] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1108.837817] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1108.848092] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1108.856009] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1108.857365] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1108.863119] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1108.878568] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1110.949614] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1110.957819] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1110.967427] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1110.974111] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1110.982536] device bridge_slave_1 left promiscuous mode [ 1110.988864] bridge0: port 2(bridge_slave_1) entered disabled state [ 1110.997086] device bridge_slave_0 left promiscuous mode [ 1111.002578] bridge0: port 1(bridge_slave_0) entered disabled state [ 1111.012456] device veth1_macvtap left promiscuous mode [ 1111.017975] device veth0_macvtap left promiscuous mode [ 1111.023675] device veth1_vlan left promiscuous mode [ 1111.030524] device veth0_vlan left promiscuous mode [ 1113.515063] Bluetooth: hci4: command 0x0409 tx timeout [ 1115.491147] device hsr_slave_1 left promiscuous mode [ 1115.498749] device hsr_slave_0 left promiscuous mode [ 1115.513735] team0 (unregistering): Port device team_slave_1 removed [ 1115.526625] team0 (unregistering): Port device team_slave_0 removed [ 1115.537183] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1115.549137] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1115.583032] bond0 (unregistering): Released all slaves [ 1115.595524] Bluetooth: hci4: command 0x041b tx timeout [ 1115.600541] IPVS: ftp: loaded support on port[0] = 21 [ 1115.717797] chnl_net:caif_netlink_parms(): no params data found [ 1115.810801] bridge0: port 1(bridge_slave_0) entered blocking state [ 1115.818176] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.832024] device bridge_slave_0 entered promiscuous mode [ 1115.839787] bridge0: port 2(bridge_slave_1) entered blocking state [ 1115.852463] bridge0: port 2(bridge_slave_1) entered disabled state [ 1115.861164] device bridge_slave_1 entered promiscuous mode [ 1115.895517] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1115.905731] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1115.930227] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1115.938441] team0: Port device team_slave_0 added [ 1115.944241] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1115.952734] team0: Port device team_slave_1 added [ 1115.976084] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1115.982347] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1116.011055] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1116.023343] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1116.030103] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1116.056442] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1116.068675] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1116.076854] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1116.104462] device hsr_slave_0 entered promiscuous mode [ 1116.110813] device hsr_slave_1 entered promiscuous mode [ 1116.125623] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1116.132858] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1116.233317] bridge0: port 2(bridge_slave_1) entered blocking state [ 1116.239881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1116.246639] bridge0: port 1(bridge_slave_0) entered blocking state [ 1116.253021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1116.306246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1116.318006] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1116.329249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1116.337456] bridge0: port 1(bridge_slave_0) entered disabled state [ 1116.344714] bridge0: port 2(bridge_slave_1) entered disabled state [ 1116.359212] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1116.366037] 8021q: adding VLAN 0 to HW filter on device team0 [ 1116.379664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1116.388295] bridge0: port 1(bridge_slave_0) entered blocking state [ 1116.394729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1116.416979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1116.431725] bridge0: port 2(bridge_slave_1) entered blocking state [ 1116.438224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1116.466217] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1116.474228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1116.483768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1116.515059] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1116.529062] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1116.535598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1116.543295] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1116.551448] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1116.576460] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1116.591050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1116.600202] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1116.619646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1116.659633] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1116.677849] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1116.690485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1116.702560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1116.769858] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1116.777954] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1116.791069] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1116.802910] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1116.810361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1116.819728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1116.830867] device veth0_vlan entered promiscuous mode [ 1116.842258] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1116.850498] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1116.861080] device veth1_vlan entered promiscuous mode [ 1116.874008] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1116.890822] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1116.913900] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1116.931265] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1116.939604] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1116.954247] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1116.963246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1116.971527] ieee802154 phy0 wpan0: encryption failed: -22 [ 1116.977594] ieee802154 phy1 wpan1: encryption failed: -22 [ 1116.984595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1116.995852] device veth0_macvtap entered promiscuous mode [ 1117.002396] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1117.013143] device veth1_macvtap entered promiscuous mode [ 1117.020537] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1117.038002] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1117.054061] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1117.064246] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1117.076861] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.090169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1117.101346] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.114803] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1117.125401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.134994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1117.145322] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.155546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1117.165701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.176649] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1117.183588] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1117.193488] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1117.201542] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1117.209814] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1117.219728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1117.230175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1117.240811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.250905] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1117.261262] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.271821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1117.282237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.292368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1117.302378] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.311929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1117.321868] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1117.332247] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1117.340649] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1117.348573] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1117.357845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1117.479646] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1117.487092] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1117.501675] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1117.512935] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1117.521852] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1117.536589] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1117.536829] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1117.561777] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1119.665223] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1119.671971] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1119.682539] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1119.689568] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1119.698606] device bridge_slave_1 left promiscuous mode [ 1119.704334] bridge0: port 2(bridge_slave_1) entered disabled state [ 1119.713250] device bridge_slave_0 left promiscuous mode [ 1119.719416] bridge0: port 1(bridge_slave_0) entered disabled state [ 1119.728936] device veth1_macvtap left promiscuous mode [ 1119.734331] device veth0_macvtap left promiscuous mode [ 1119.739893] device veth1_vlan left promiscuous mode [ 1119.745343] device veth0_vlan left promiscuous mode [ 1122.154882] Bluetooth: hci4: command 0x0409 tx timeout [ 1124.205644] device hsr_slave_1 left promiscuous mode [ 1124.213367] device hsr_slave_0 left promiscuous mode [ 1124.231440] team0 (unregistering): Port device team_slave_1 removed [ 1124.238868] Bluetooth: hci4: command 0x041b tx timeout [ 1124.248800] team0 (unregistering): Port device team_slave_0 removed [ 1124.258928] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1124.271465] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1124.303245] bond0 (unregistering): Released all slaves [ 1124.320684] IPVS: ftp: loaded support on port[0] = 21 [ 1124.432197] chnl_net:caif_netlink_parms(): no params data found [ 1124.558734] bridge0: port 1(bridge_slave_0) entered blocking state [ 1124.571146] bridge0: port 1(bridge_slave_0) entered disabled state [ 1124.579740] device bridge_slave_0 entered promiscuous mode [ 1124.595563] bridge0: port 2(bridge_slave_1) entered blocking state [ 1124.602080] bridge0: port 2(bridge_slave_1) entered disabled state [ 1124.615474] device bridge_slave_1 entered promiscuous mode [ 1124.651789] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1124.661917] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1124.700468] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1124.712839] team0: Port device team_slave_0 added [ 1124.722092] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1124.736170] team0: Port device team_slave_1 added [ 1124.769647] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1124.777422] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1124.816571] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1124.833452] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1124.841059] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1124.873166] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1124.895154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1124.903136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1124.942551] device hsr_slave_0 entered promiscuous mode [ 1124.953096] device hsr_slave_1 entered promiscuous mode [ 1124.970045] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1124.979129] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1125.131853] bridge0: port 2(bridge_slave_1) entered blocking state [ 1125.138314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1125.145061] bridge0: port 1(bridge_slave_0) entered blocking state [ 1125.151440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1125.262260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1125.277033] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1125.288722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1125.296261] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.303952] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.324327] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1125.330713] 8021q: adding VLAN 0 to HW filter on device team0 [ 1125.348232] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1125.355593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1125.363574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1125.372470] bridge0: port 1(bridge_slave_0) entered blocking state [ 1125.378989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1125.389715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1125.401722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1125.413948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1125.428192] bridge0: port 2(bridge_slave_1) entered blocking state [ 1125.434572] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1125.452824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1125.462349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1125.481182] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1125.488497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1125.500672] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1125.513705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1125.529356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1125.542589] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1125.550702] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1125.558535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1125.567124] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1125.578382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1125.585396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1125.593283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1125.604440] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1125.611524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1125.620195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1125.630055] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1125.637521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1125.650344] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1125.658760] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1125.665454] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1125.672191] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1125.683507] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1125.697777] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1125.707746] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1125.716050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1125.724085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1125.758756] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1125.766425] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1125.773167] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1125.783251] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1125.790879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1125.800834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1125.810886] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1125.819681] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1125.828469] device veth0_vlan entered promiscuous mode [ 1125.840753] device veth1_vlan entered promiscuous mode [ 1125.846665] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1125.856123] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1125.868518] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1125.881099] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1125.889486] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1125.897935] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1125.905840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1125.915946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1125.926945] device veth0_macvtap entered promiscuous mode [ 1125.933607] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1125.946670] device veth1_macvtap entered promiscuous mode [ 1125.953068] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1125.963896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1125.975069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1125.983973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1125.995219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1126.004435] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1126.015789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1126.027005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1126.038651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1126.047861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1126.058052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1126.067676] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1126.078264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1126.088825] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1126.096578] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1126.104986] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1126.112639] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1126.120482] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1126.129801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1126.140139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1126.152882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1126.163328] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1126.173226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1126.182767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1126.192567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1126.202581] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1126.212740] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1126.222151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1126.233179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1126.244262] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1126.251635] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1126.260762] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1126.269077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1126.315175] Bluetooth: hci4: command 0x040f tx timeout [ 1126.410033] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1126.417125] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1126.437818] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1126.457470] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1126.463693] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1126.473143] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1126.482677] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1126.490254] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1128.490721] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1128.497958] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1128.506234] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1128.513252] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1128.522698] device bridge_slave_1 left promiscuous mode [ 1128.528458] bridge0: port 2(bridge_slave_1) entered disabled state [ 1128.536096] device bridge_slave_0 left promiscuous mode [ 1128.541682] bridge0: port 1(bridge_slave_0) entered disabled state [ 1128.552570] device veth1_macvtap left promiscuous mode [ 1128.558142] device veth0_macvtap left promiscuous mode [ 1128.563587] device veth1_vlan left promiscuous mode [ 1128.571187] device veth0_vlan left promiscuous mode [ 1131.114882] Bluetooth: hci4: command 0x0409 tx timeout [ 1132.993698] device hsr_slave_1 left promiscuous mode [ 1133.001404] device hsr_slave_0 left promiscuous mode [ 1133.020467] team0 (unregistering): Port device team_slave_1 removed [ 1133.030406] team0 (unregistering): Port device team_slave_0 removed [ 1133.041537] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1133.052603] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1133.082643] bond0 (unregistering): Released all slaves [ 1133.101633] IPVS: ftp: loaded support on port[0] = 21 [ 1133.194879] Bluetooth: hci4: command 0x041b tx timeout [ 1133.221478] chnl_net:caif_netlink_parms(): no params data found [ 1133.343560] bridge0: port 1(bridge_slave_0) entered blocking state [ 1133.357080] bridge0: port 1(bridge_slave_0) entered disabled state [ 1133.369637] device bridge_slave_0 entered promiscuous mode [ 1133.379336] bridge0: port 2(bridge_slave_1) entered blocking state [ 1133.391078] bridge0: port 2(bridge_slave_1) entered disabled state [ 1133.404059] device bridge_slave_1 entered promiscuous mode [ 1133.442916] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1133.459836] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1133.500271] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1133.513011] team0: Port device team_slave_0 added [ 1133.529248] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1133.539233] team0: Port device team_slave_1 added [ 1133.573561] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1133.582593] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1133.619649] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1133.634654] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1133.647194] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1133.679710] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1133.692638] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1133.708872] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1133.744629] device hsr_slave_0 entered promiscuous mode [ 1133.758687] device hsr_slave_1 entered promiscuous mode [ 1133.770288] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1133.780078] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1133.939765] bridge0: port 2(bridge_slave_1) entered blocking state [ 1133.946974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1133.954028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1133.960562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1134.038144] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1134.054044] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1134.072863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1134.089895] bridge0: port 1(bridge_slave_0) entered disabled state [ 1134.098891] bridge0: port 2(bridge_slave_1) entered disabled state [ 1134.142418] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1134.174868] 8021q: adding VLAN 0 to HW filter on device team0 [ 1134.187367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1134.195199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1134.203528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1134.211363] bridge0: port 1(bridge_slave_0) entered blocking state [ 1134.218001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1134.234510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1134.241998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1134.261745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1134.270205] bridge0: port 2(bridge_slave_1) entered blocking state [ 1134.276733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1134.287706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1134.299028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1134.309454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1134.318129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1134.329733] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1134.337048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1134.345158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1134.353063] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1134.363336] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1134.370605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1134.379953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1134.390151] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1134.399001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1134.407005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1134.420137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1134.427852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1134.437600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1134.448470] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1134.454515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1134.469978] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1134.478374] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1134.485187] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1134.492298] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1134.504186] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1134.520027] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1134.530269] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1134.538096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1134.547405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1134.581589] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1134.590133] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1134.598949] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1134.610346] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1134.617214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1134.627042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1134.635377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1134.642808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1134.652878] device veth0_vlan entered promiscuous mode [ 1134.663716] device veth1_vlan entered promiscuous mode [ 1134.669903] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1134.680062] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1134.693976] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1134.704641] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1134.711596] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1134.719691] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1134.729164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1134.737427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1134.748858] device veth0_macvtap entered promiscuous mode [ 1134.756612] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1134.765577] device veth1_macvtap entered promiscuous mode [ 1134.771878] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1134.782795] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1134.793611] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1134.804046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1134.813867] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1134.823923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1134.835155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1134.845682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1134.855753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1134.864964] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1134.876011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1134.885201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1134.895903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1134.906782] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1134.914501] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1134.923782] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1134.933359] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1134.940875] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1134.949933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1134.961200] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1134.971262] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1134.980590] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1134.992919] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1135.002570] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1135.013892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1135.023091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1135.035345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1135.044569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1135.054752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1135.065199] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1135.073190] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1135.081492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1135.090310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1135.210300] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1135.224675] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1135.261383] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1135.275994] Bluetooth: hci4: command 0x040f tx timeout [ 1135.282125] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1135.292137] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1135.300141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1135.308290] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1135.318126] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1137.409948] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1137.418757] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1137.427696] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1137.435057] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1137.443806] device bridge_slave_1 left promiscuous mode [ 1137.450435] bridge0: port 2(bridge_slave_1) entered disabled state [ 1137.458040] device bridge_slave_0 left promiscuous mode [ 1137.463523] bridge0: port 1(bridge_slave_0) entered disabled state [ 1137.473422] device veth1_macvtap left promiscuous mode [ 1137.480009] device veth0_macvtap left promiscuous mode [ 1137.485636] device veth1_vlan left promiscuous mode [ 1137.490702] device veth0_vlan left promiscuous mode [ 1139.915105] Bluetooth: hci4: command 0x0409 tx timeout [ 1141.919210] device hsr_slave_1 left promiscuous mode [ 1141.928633] device hsr_slave_0 left promiscuous mode [ 1141.942064] team0 (unregistering): Port device team_slave_1 removed [ 1141.955341] team0 (unregistering): Port device team_slave_0 removed [ 1141.966522] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1141.977039] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1142.005142] Bluetooth: hci4: command 0x041b tx timeout [ 1142.015385] bond0 (unregistering): Released all slaves [ 1142.032708] IPVS: ftp: loaded support on port[0] = 21 [ 1142.140970] chnl_net:caif_netlink_parms(): no params data found [ 1142.247806] bridge0: port 1(bridge_slave_0) entered blocking state [ 1142.258814] bridge0: port 1(bridge_slave_0) entered disabled state [ 1142.269585] device bridge_slave_0 entered promiscuous mode [ 1142.280953] bridge0: port 2(bridge_slave_1) entered blocking state [ 1142.289508] bridge0: port 2(bridge_slave_1) entered disabled state [ 1142.301007] device bridge_slave_1 entered promiscuous mode [ 1142.326097] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1142.339258] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1142.372787] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1142.380871] team0: Port device team_slave_0 added [ 1142.387315] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1142.398819] team0: Port device team_slave_1 added [ 1142.430537] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1142.441770] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1142.474213] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1142.496332] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1142.503069] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1142.537496] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1142.553241] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1142.570171] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1142.611219] device hsr_slave_0 entered promiscuous mode [ 1142.619424] device hsr_slave_1 entered promiscuous mode [ 1142.629795] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1142.644025] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1142.791933] bridge0: port 2(bridge_slave_1) entered blocking state [ 1142.798537] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1142.805716] bridge0: port 1(bridge_slave_0) entered blocking state [ 1142.812130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1142.886402] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1142.902580] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1142.929705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1142.939206] bridge0: port 1(bridge_slave_0) entered disabled state [ 1142.966721] bridge0: port 2(bridge_slave_1) entered disabled state [ 1142.982272] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1142.988698] 8021q: adding VLAN 0 to HW filter on device team0 [ 1143.001903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1143.011592] bridge0: port 1(bridge_slave_0) entered blocking state [ 1143.018027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1143.036034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1143.044475] bridge0: port 2(bridge_slave_1) entered blocking state [ 1143.050908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1143.062687] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1143.072044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1143.084731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1143.100034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1143.111359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1143.129844] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1143.141850] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1143.154753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1143.163309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1143.180812] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1143.188832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1143.197835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1143.210163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1143.218864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1143.229481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1143.240541] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1143.248123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1143.266167] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1143.274478] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1143.282438] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1143.290947] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1143.304009] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1143.322350] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1143.333689] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1143.343825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1143.359359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1143.412345] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1143.420908] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1143.428482] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1143.439111] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1143.446353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1143.453791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1143.462728] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1143.470218] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1143.480120] device veth0_vlan entered promiscuous mode [ 1143.491671] device veth1_vlan entered promiscuous mode [ 1143.498002] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1143.508009] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1143.519851] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1143.535961] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1143.543180] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1143.550664] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1143.558680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1143.567336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1143.577517] device veth0_macvtap entered promiscuous mode [ 1143.583707] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1143.594838] device veth1_macvtap entered promiscuous mode [ 1143.601814] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1143.612056] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1143.621948] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1143.631329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1143.643582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.652999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1143.662984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.672719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1143.682797] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.693258] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1143.703821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.713633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1143.723551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.733797] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1143.742236] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1143.749233] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1143.757418] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1143.765890] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1143.773722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1143.788207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1143.798347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.809700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1143.821679] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.831222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1143.843006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.853169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1143.863320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.872995] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1143.882901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.893396] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1143.900731] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1143.908392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1143.917691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1144.054121] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1144.072218] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1144.075246] Bluetooth: hci4: command 0x040f tx timeout [ 1144.090524] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1144.105612] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1144.114227] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1144.124137] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1144.138632] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1144.147005] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1146.154357] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1146.161255] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1146.171015] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1146.179068] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1146.190582] device bridge_slave_1 left promiscuous mode [ 1146.197109] bridge0: port 2(bridge_slave_1) entered disabled state [ 1146.205932] device bridge_slave_0 left promiscuous mode [ 1146.211400] bridge0: port 1(bridge_slave_0) entered disabled state [ 1146.222899] device veth1_macvtap left promiscuous mode [ 1146.228360] device veth0_macvtap left promiscuous mode [ 1146.233692] device veth1_vlan left promiscuous mode [ 1146.239405] device veth0_vlan left promiscuous mode [ 1148.714897] Bluetooth: hci4: command 0x0409 tx timeout [ 1150.667756] device hsr_slave_1 left promiscuous mode [ 1150.676025] device hsr_slave_0 left promiscuous mode [ 1150.690967] team0 (unregistering): Port device team_slave_1 removed [ 1150.703841] team0 (unregistering): Port device team_slave_0 removed [ 1150.714079] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1150.726563] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1150.757975] bond0 (unregistering): Released all slaves [ 1150.775369] IPVS: ftp: loaded support on port[0] = 21 [ 1150.804977] Bluetooth: hci4: command 0x041b tx timeout [ 1150.910845] chnl_net:caif_netlink_parms(): no params data found [ 1151.027552] bridge0: port 1(bridge_slave_0) entered blocking state [ 1151.034352] bridge0: port 1(bridge_slave_0) entered disabled state [ 1151.047881] device bridge_slave_0 entered promiscuous mode [ 1151.059570] bridge0: port 2(bridge_slave_1) entered blocking state [ 1151.068061] bridge0: port 2(bridge_slave_1) entered disabled state [ 1151.079371] device bridge_slave_1 entered promiscuous mode [ 1151.114023] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1151.129809] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1151.162892] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1151.174060] team0: Port device team_slave_0 added [ 1151.183386] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1151.194326] team0: Port device team_slave_1 added [ 1151.223713] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1151.230542] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1151.256708] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1151.269258] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1151.276027] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1151.302526] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1151.315802] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1151.323467] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1151.350237] device hsr_slave_0 entered promiscuous mode [ 1151.357265] device hsr_slave_1 entered promiscuous mode [ 1151.363673] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1151.373776] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1151.510629] bridge0: port 2(bridge_slave_1) entered blocking state [ 1151.517104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1151.523959] bridge0: port 1(bridge_slave_0) entered blocking state [ 1151.530600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1151.604730] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1151.623343] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1151.633682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1151.648027] bridge0: port 1(bridge_slave_0) entered disabled state [ 1151.660182] bridge0: port 2(bridge_slave_1) entered disabled state [ 1151.674106] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1151.689555] 8021q: adding VLAN 0 to HW filter on device team0 [ 1151.709311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1151.735530] bridge0: port 1(bridge_slave_0) entered blocking state [ 1151.741947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1151.772108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1151.780974] bridge0: port 2(bridge_slave_1) entered blocking state [ 1151.787931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1151.798354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1151.811033] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1151.821107] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1151.832823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1151.841731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1151.853853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1151.864241] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1151.873396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1151.885628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1151.893490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1151.902732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1151.915073] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1151.921145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1151.941314] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1151.950457] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1151.959456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1151.967315] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1151.979935] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1151.998492] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1152.011725] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1152.020988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1152.032156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1152.104268] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1152.118016] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1152.129450] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1152.142411] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1152.149566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1152.158877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1152.169651] device veth0_vlan entered promiscuous mode [ 1152.176207] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1152.183196] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1152.196157] device veth1_vlan entered promiscuous mode [ 1152.203137] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1152.212521] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1152.225074] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1152.236920] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1152.244396] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1152.252269] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1152.259885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1152.268294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1152.278814] device veth0_macvtap entered promiscuous mode [ 1152.285714] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1152.295528] device veth1_macvtap entered promiscuous mode [ 1152.302316] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1152.311631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1152.322947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1152.332754] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.343856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.353582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.363365] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.372737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.382709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.392101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.402757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.412416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1152.422742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.434022] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1152.442754] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1152.452360] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1152.461443] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1152.470052] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1152.478051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1152.491721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.502282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.512276] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.522614] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.531944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.542084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.551436] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.561437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.570715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1152.580532] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.592022] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1152.599365] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1152.607029] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1152.616233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1152.738706] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1152.746577] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1152.753722] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1152.783717] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1152.794397] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1152.810070] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1152.818797] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1152.826941] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1152.875683] Bluetooth: hci4: command 0x040f tx timeout [ 1154.831407] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1154.838337] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1154.847812] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1154.854684] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1154.863030] device bridge_slave_1 left promiscuous mode [ 1154.869159] bridge0: port 2(bridge_slave_1) entered disabled state [ 1154.878718] device bridge_slave_0 left promiscuous mode [ 1154.884171] bridge0: port 1(bridge_slave_0) entered disabled state [ 1154.893783] device veth1_macvtap left promiscuous mode [ 1154.899260] device veth0_macvtap left promiscuous mode [ 1154.904673] device veth1_vlan left promiscuous mode [ 1154.909846] device veth0_vlan left promiscuous mode [ 1157.434859] Bluetooth: hci4: command 0x0409 tx timeout [ 1159.346049] device hsr_slave_1 left promiscuous mode [ 1159.353753] device hsr_slave_0 left promiscuous mode [ 1159.371058] team0 (unregistering): Port device team_slave_1 removed [ 1159.382041] team0 (unregistering): Port device team_slave_0 removed [ 1159.392610] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1159.405009] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1159.436823] bond0 (unregistering): Released all slaves [ 1159.451700] IPVS: ftp: loaded support on port[0] = 21 [ 1159.524864] Bluetooth: hci4: command 0x041b tx timeout [ 1159.567110] chnl_net:caif_netlink_parms(): no params data found [ 1159.674706] bridge0: port 1(bridge_slave_0) entered blocking state [ 1159.682338] bridge0: port 1(bridge_slave_0) entered disabled state [ 1159.696088] device bridge_slave_0 entered promiscuous mode [ 1159.713804] bridge0: port 2(bridge_slave_1) entered blocking state [ 1159.720356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1159.734392] device bridge_slave_1 entered promiscuous mode [ 1159.772378] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1159.782458] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1159.821868] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1159.838772] team0: Port device team_slave_0 added [ 1159.844635] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1159.858089] team0: Port device team_slave_1 added [ 1159.888681] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1159.898008] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1159.927493] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1159.940067] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1159.947509] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1159.975323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1159.987116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1159.995374] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1160.022970] device hsr_slave_0 entered promiscuous mode [ 1160.029200] device hsr_slave_1 entered promiscuous mode [ 1160.036162] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1160.043469] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1160.181323] bridge0: port 2(bridge_slave_1) entered blocking state [ 1160.188031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1160.194946] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.201319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1160.280466] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1160.297832] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1160.314540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1160.333803] bridge0: port 1(bridge_slave_0) entered disabled state [ 1160.342404] bridge0: port 2(bridge_slave_1) entered disabled state [ 1160.361616] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1160.372905] 8021q: adding VLAN 0 to HW filter on device team0 [ 1160.391066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1160.400379] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.406826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1160.451912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1160.460587] bridge0: port 2(bridge_slave_1) entered blocking state [ 1160.467423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1160.487165] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1160.495887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1160.504048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1160.513006] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1160.524114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1160.532157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1160.540292] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1160.552273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1160.560295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1160.568641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1160.580921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1160.589474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1160.603288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1160.613734] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1160.627035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1160.654059] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1160.669139] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1160.680222] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1160.689601] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1160.706287] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1160.723141] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1160.736588] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1160.744570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1160.753872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1160.812689] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1160.820179] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1160.827797] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1160.838586] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1160.845437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1160.852838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1160.862719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1160.870354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1160.879262] device veth0_vlan entered promiscuous mode [ 1160.890960] device veth1_vlan entered promiscuous mode [ 1160.896875] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1160.907216] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1160.919124] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1160.928340] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1160.936807] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1160.944169] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1160.952320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1160.961374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1160.971868] device veth0_macvtap entered promiscuous mode [ 1160.979311] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1160.990464] device veth1_macvtap entered promiscuous mode [ 1160.997085] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1161.008447] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1161.018402] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1161.028156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1161.038724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1161.050868] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1161.061558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1161.071211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1161.081558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1161.092931] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1161.103663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1161.113625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1161.124516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1161.135780] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1161.143772] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1161.151342] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1161.158829] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1161.166860] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1161.175808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1161.186306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1161.197986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1161.209051] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1161.219434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1161.229309] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1161.239449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1161.250790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1161.260639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1161.269997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1161.280753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1161.291173] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1161.298172] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1161.305446] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1161.313649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1161.436391] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1161.447928] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1161.464317] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1161.475923] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1161.514320] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1161.521054] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1161.532546] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1161.540908] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1161.595912] Bluetooth: hci4: command 0x040f tx timeout [ 1163.591355] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1163.598745] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1163.608099] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1163.615959] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1163.623904] device bridge_slave_1 left promiscuous mode [ 1163.630728] bridge0: port 2(bridge_slave_1) entered disabled state [ 1163.638403] device bridge_slave_0 left promiscuous mode [ 1163.644070] bridge0: port 1(bridge_slave_0) entered disabled state [ 1163.654185] device veth1_macvtap left promiscuous mode [ 1163.659783] device veth0_macvtap left promiscuous mode [ 1163.665331] device veth1_vlan left promiscuous mode [ 1163.670372] device veth0_vlan left promiscuous mode [ 1166.154864] Bluetooth: hci4: command 0x0409 tx timeout [ 1168.119737] device hsr_slave_1 left promiscuous mode [ 1168.127611] device hsr_slave_0 left promiscuous mode [ 1168.145822] team0 (unregistering): Port device team_slave_1 removed [ 1168.156976] team0 (unregistering): Port device team_slave_0 removed [ 1168.167163] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1168.180765] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1168.213298] bond0 (unregistering): Released all slaves [ 1168.230054] IPVS: ftp: loaded support on port[0] = 21 [ 1168.235952] Bluetooth: hci4: command 0x041b tx timeout [ 1168.346087] chnl_net:caif_netlink_parms(): no params data found [ 1168.426904] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.433494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.442147] device bridge_slave_0 entered promiscuous mode [ 1168.452303] bridge0: port 2(bridge_slave_1) entered blocking state [ 1168.459224] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.468638] device bridge_slave_1 entered promiscuous mode [ 1168.492890] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1168.503474] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1168.527622] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1168.536290] team0: Port device team_slave_0 added [ 1168.542178] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1168.550948] team0: Port device team_slave_1 added [ 1168.576633] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1168.583000] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1168.609392] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1168.627982] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1168.634248] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1168.673004] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1168.690152] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1168.698027] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1168.738371] device hsr_slave_0 entered promiscuous mode [ 1168.744599] device hsr_slave_1 entered promiscuous mode [ 1168.757317] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1168.764552] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1168.918063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1168.924596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1168.931333] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.937764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1169.010543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1169.020942] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1169.040266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1169.053513] bridge0: port 1(bridge_slave_0) entered disabled state [ 1169.061049] bridge0: port 2(bridge_slave_1) entered disabled state [ 1169.079746] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1169.091520] 8021q: adding VLAN 0 to HW filter on device team0 [ 1169.104381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1169.135340] bridge0: port 1(bridge_slave_0) entered blocking state [ 1169.141730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1169.166902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1169.176212] bridge0: port 2(bridge_slave_1) entered blocking state [ 1169.182582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1169.190839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1169.211327] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1169.221882] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1169.232974] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1169.241357] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1169.249816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1169.258816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1169.268253] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1169.289176] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1169.297321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1169.312529] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1169.323107] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1169.333513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1169.349319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1169.373304] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1169.384455] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1169.398633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1169.411468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1169.492240] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1169.500047] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1169.508659] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1169.529944] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1169.539566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1169.549178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1169.557481] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1169.564636] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1169.575159] device veth0_vlan entered promiscuous mode [ 1169.584589] device veth1_vlan entered promiscuous mode [ 1169.591505] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1169.604402] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1169.621128] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1169.633712] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1169.644486] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1169.659174] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1169.669922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1169.682625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1169.694127] device veth0_macvtap entered promiscuous mode [ 1169.704495] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1169.715604] device veth1_macvtap entered promiscuous mode [ 1169.721754] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1169.731128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1169.741482] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1169.751887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1169.762953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1169.772827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1169.784109] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1169.793716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1169.803958] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1169.813615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1169.823606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1169.832786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1169.842712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1169.854690] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1169.862258] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1169.869864] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1169.877894] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1169.885582] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1169.893423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1169.903889] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1169.915633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1169.925986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1169.937403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1169.947964] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1169.958531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1169.969142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1169.980184] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1169.989801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1170.000404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1170.011062] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1170.019324] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1170.027655] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1170.037017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1170.157036] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1170.170941] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1170.197513] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1170.204082] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1170.220767] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1170.236003] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1170.243170] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1170.258269] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1170.315393] Bluetooth: hci4: command 0x040f tx timeout [ 1172.269327] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1172.276798] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1172.285866] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1172.293702] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1172.302565] device bridge_slave_1 left promiscuous mode [ 1172.310342] bridge0: port 2(bridge_slave_1) entered disabled state [ 1172.319261] device bridge_slave_0 left promiscuous mode [ 1172.325477] bridge0: port 1(bridge_slave_0) entered disabled state [ 1172.334551] device veth1_macvtap left promiscuous mode [ 1172.340161] device veth0_macvtap left promiscuous mode [ 1172.345580] device veth1_vlan left promiscuous mode [ 1172.350935] device veth0_vlan left promiscuous mode [ 1174.794891] Bluetooth: hci4: command 0x0409 tx timeout [ 1176.780673] device hsr_slave_1 left promiscuous mode [ 1176.788669] device hsr_slave_0 left promiscuous mode [ 1176.808520] team0 (unregistering): Port device team_slave_1 removed [ 1176.819344] team0 (unregistering): Port device team_slave_0 removed [ 1176.831004] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1176.841449] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1176.872871] bond0 (unregistering): Released all slaves [ 1176.891019] IPVS: ftp: loaded support on port[0] = 21 [ 1176.896986] Bluetooth: hci4: command 0x041b tx timeout [ 1177.010713] chnl_net:caif_netlink_parms(): no params data found [ 1177.091787] bridge0: port 1(bridge_slave_0) entered blocking state [ 1177.103934] bridge0: port 1(bridge_slave_0) entered disabled state [ 1177.112809] device bridge_slave_0 entered promiscuous mode [ 1177.127170] bridge0: port 2(bridge_slave_1) entered blocking state [ 1177.133683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1177.147213] device bridge_slave_1 entered promiscuous mode [ 1177.182223] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1177.194465] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1177.231586] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1177.239462] team0: Port device team_slave_0 added [ 1177.245609] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1177.253514] team0: Port device team_slave_1 added [ 1177.289510] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1177.296197] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1177.326344] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1177.342420] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1177.350683] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1177.383181] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1177.395600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1177.403348] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1177.431880] device hsr_slave_0 entered promiscuous mode [ 1177.445366] device hsr_slave_1 entered promiscuous mode [ 1177.451946] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1177.465301] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1177.612128] bridge0: port 2(bridge_slave_1) entered blocking state [ 1177.618682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1177.625866] bridge0: port 1(bridge_slave_0) entered blocking state [ 1177.632573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1177.682964] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1177.693494] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1177.713831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1177.728053] bridge0: port 1(bridge_slave_0) entered disabled state [ 1177.737272] bridge0: port 2(bridge_slave_1) entered disabled state [ 1177.752988] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1177.768303] 8021q: adding VLAN 0 to HW filter on device team0 [ 1177.788120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1177.800268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1177.808284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1177.848673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1177.862292] bridge0: port 2(bridge_slave_1) entered blocking state [ 1177.868712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1177.885226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1177.912231] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1177.924589] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1177.938850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1177.947375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1177.958383] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1177.964457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1177.983723] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1177.991792] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1178.003331] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1178.011732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1178.024458] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1178.041891] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1178.051690] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1178.059798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1178.068332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1178.118719] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1178.133139] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1178.143849] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1178.160220] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1178.171108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1178.181888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1178.199168] device veth0_vlan entered promiscuous mode [ 1178.209862] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1178.219810] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1178.239712] device veth1_vlan entered promiscuous mode [ 1178.249018] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1178.260334] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1178.274427] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1178.286028] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1178.292903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1178.302450] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1178.311197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1178.319448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1178.329952] device veth0_macvtap entered promiscuous mode [ 1178.337610] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1178.348854] device veth1_macvtap entered promiscuous mode [ 1178.355896] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1178.367447] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1178.378782] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1178.388497] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1178.399041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.407072] ieee802154 phy0 wpan0: encryption failed: -22 [ 1178.409289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1178.414703] ieee802154 phy1 wpan1: encryption failed: -22 [ 1178.425846] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.442676] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1178.454186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.463397] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1178.473195] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.483710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1178.493590] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.503723] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1178.511115] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1178.518591] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1178.527455] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1178.535255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1178.545796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1178.557357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1178.567632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.577996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1178.588315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.597551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1178.607351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.616644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1178.628406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.638011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1178.648907] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.660375] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1178.667443] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1178.677308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1178.685842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1178.817405] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1178.830059] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1178.852733] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1178.861652] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1178.868769] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1178.885753] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1178.892576] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1178.913679] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1178.955020] Bluetooth: hci4: command 0x040f tx timeout 2021/03/04 03:35:37 executor 4 failed 11 times: executor 4: exit status 67 running=-1 collide=0 completed=2 flag_threaded=1 flag_collide=1 current=0 th # 0: created=1 executing=0 colliding=0 ready=0 done=1 call_index=1 res=0 reserrno=14 th # 1: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 2: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 3: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 4: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 5: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 6: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 7: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 8: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 9: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #10: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #11: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #12: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #13: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #14: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #15: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 SYZFAIL: negative running (errno 11: Resource temporarily unavailable) SYZFAIL: child failed (errno 0: Success) loop exited with status 67