012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:14 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:14 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xffffa888}, 0x0) 05:52:14 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0xf0250000000000, 0x8e4a0000, 0x1000000}], 0x0) 05:52:14 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifi\x00', 0x0, 0x0) [ 2343.015420][T30647] UBIFS error (pid: 30647): cannot open "ubi!_0x0", error -19 [ 2343.016540][ T3841] UBIFS error (pid: 30647): cannot open "ubi!_0x0", error -19 05:52:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x4e22, @broadcast}}) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x121341, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000003c0)) mkdir(&(0x7f0000000380)='./file0/file0/file0\x00', 0x10) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000280)={0x200, 0x12, 0x800, 0x9, "b2f01fa2d0e3230707ed25cb5c3a041a7ab36e955a06898442afdd3cf7f1c381"}) r3 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x6, 0x100fff) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000180)}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_t\xd1\xa4\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0e000000d100002267518f699d431029ddeb00000004000000010000800000000001ffffff0500000009000000f7ffffff0700000004002000edf80000ff070000fdffffff04000000ff01000000000000000000000000"]}) mount$bpf(0x0, &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000240)='bpf\x00', 0x100004, &(0x7f00000002c0)=ANY=[@ANYBLOB="6d6f64653d30303030b03030303030303030303030303030303031342c6d3030303030303030303030303030342c6d6f64653d30303030303830303030303030303030303030303030332c00"]) 05:52:14 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:14 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:14 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0xf0260000000000, 0x8e4a0000, 0x1000000}], 0x0) 05:52:14 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifl\x00', 0x0, 0x0) 05:52:14 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:14 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 2343.287932][T30811] UBIFS error (pid: 30811): cannot open "ubi!_0x0", error -19 05:52:14 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:14 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x80000001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x67bdbcdd, 0x7, 0x3a}, 0x10) 05:52:14 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0xf0270000000000, 0x8e4a0000, 0x1000000}], 0x0) [ 2343.292294][ T3841] UBIFS error (pid: 30811): cannot open "ubi!_0x0", error -19 05:52:14 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifo\x00', 0x0, 0x0) 05:52:14 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2343.585832][T30950] UBIFS error (pid: 30986): cannot open "ubi!_0x0", error -19 [ 2343.587432][T30950] hfsplus: unable to find HFS+ superblock 05:52:15 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:15 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0xf0280000000000, 0x8e4a0000, 0x1000000}], 0x0) 05:52:15 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2343.601190][T30950] UBIFS error (pid: 30986): cannot open "ubi!_0x0", error -19 05:52:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xffffffc3}, 0x0) 05:52:15 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifp\x00', 0x0, 0x0) 05:52:15 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0xf0ffffff7f0000, 0x8e4a0000, 0x1000000}], 0x0) [ 2343.882242][T31111] UBIFS error (pid: 31111): cannot open "ubi!_0x0", error -19 [ 2343.882979][ T3841] UBIFS error (pid: 31111): cannot open "ubi!_0x0", error -19 05:52:15 executing program 5: mmap(&(0x7f0000062000/0x3000)=nil, 0x3000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x0, 0xff) fcntl$setlease(r0, 0x400, 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000140)=0x80, 0x4) ioctl(r1, 0x100000a912, &(0x7f0000000040)="0adc1f023c123f3188a070") r2 = creat(&(0x7f0000000000)='./file0\x00', 0x150) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000180)=0x4, 0x4) userfaultfd(0x800) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x60) 05:52:15 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:15 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2344.080378][ C1] net_ratelimit: 22 callbacks suppressed [ 2344.080388][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2344.092447][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:52:15 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifu\x00', 0x0, 0x0) 05:52:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xfffffffc}, 0x0) [ 2344.134609][T31266] UBIFS error (pid: 31266): cannot open "ubi!_0x0", error -19 [ 2344.137666][ T3841] UBIFS error (pid: 31266): cannot open "ubi!_0x0", error -19 05:52:15 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x100000000000000, 0x8e4a0000, 0x1000000}], 0x0) 05:52:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) select(0x40, &(0x7f0000000000)={0x4, 0x0, 0x8, 0x7, 0x0, 0x3ff, 0x5, 0x7}, &(0x7f0000000040)={0x510, 0x0, 0x2200, 0x5, 0x6, 0x2, 0x1, 0x51}, &(0x7f00000000c0)={0x101, 0x6ff, 0x6, 0x100000001, 0x7, 0x8, 0x0, 0xfffffffffffffffb}, &(0x7f0000000100)) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x29, 0x1, 0x0, 0x0, {0x4}, [@nested={0x8, 0x9, [@generic="c9"]}]}, 0x1c}}, 0x0) 05:52:15 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:15 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2344.320418][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2344.326323][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2344.332228][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2344.338023][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2344.343969][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2344.349747][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:15 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifx\x00', 0x0, 0x0) 05:52:15 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x200000000000000, 0x8e4a0000, 0x1000000}], 0x0) [ 2344.442929][T31480] UBIFS error (pid: 31480): cannot open "ubi!_0x0", error -19 [ 2344.447094][ T3841] UBIFS error (pid: 31480): cannot open "ubi!_0x0", error -19 [ 2344.480182][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2344.486151][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r3 = gettid() fcntl$setown(r0, 0x8, r3) connect$inet6(r2, &(0x7f0000000080), 0x1c) r4 = dup2(r2, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_RELEASE(r4, 0x6431) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000000c0)) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, 0x0, 0x0) 05:52:15 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xfffffffe}, 0x0) 05:52:16 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:16 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x02', 0x0, 0x0) 05:52:16 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0xffffffff00000000, 0x8e4a0000, 0x1000000}], 0x0) [ 2344.742345][T31591] UBIFS error (pid: 31591): cannot open "ubi!_0x0", error -19 05:52:16 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:16 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x03', 0x0, 0x0) [ 2344.748028][ T3841] UBIFS error (pid: 31591): cannot open "ubi!_0x0", error -19 05:52:16 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:16 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc03b000, 0x1000000}], 0x0) 05:52:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 2344.990181][T31779] UBIFS error (pid: 31779): cannot open "ubi!_0x0", error -19 05:52:16 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2344.990950][ T3841] UBIFS error (pid: 31779): cannot open "ubi!_0x0", error -19 [ 2345.231279][T31892] UBIFS error (pid: 31892): cannot open "ubi!_0x0", error -19 [ 2345.233294][ T3841] UBIFS error (pid: 31892): cannot open "ubi!_0x0", error -19 05:52:16 executing program 5: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) close(r0) open$dir(0x0, 0x0, 0x0) truncate(0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000000)=0x54) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x20, @remote, 0xfffffffffffffffb}}, 0x55, 0x7}, &(0x7f0000000240)=0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000480)={r1, 0x80000000}, &(0x7f00000004c0)=0x8) 05:52:16 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x04', 0x0, 0x0) 05:52:16 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:16 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:16 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc03f000, 0x1000000}], 0x0) 05:52:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 2345.451891][T31905] UBIFS error (pid: 31905): cannot open "ubi!_0x0", error -19 05:52:16 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:16 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:17 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x05', 0x0, 0x0) [ 2345.458089][ T3841] UBIFS error (pid: 31905): cannot open "ubi!_0x0", error -19 05:52:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x300000000000000}, 0x0) [ 2345.680383][T32055] UBIFS error (pid: 32055): cannot open "ubi!_0x0", error -19 05:52:17 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:17 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2345.681657][ T3841] UBIFS error (pid: 32055): cannot open "ubi!_0x0", error -19 [ 2345.943631][T32126] UBIFS error (pid: 32126): cannot open "ubi!_0x0", error -19 [ 2345.944528][ T3841] UBIFS error (pid: 32126): cannot open "ubi!_0x0", error -19 05:52:17 executing program 5: r0 = socket(0x400000000000010, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0099f0003be90000ed190e020808160000000031ba0080080001007f196be0", 0x24) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x5, 0x3ff}]}, 0xc, 0x1) readv(r0, &(0x7f00000007c0)=[{&(0x7f00000003c0)=""/43, 0x2b}], 0x1) 05:52:17 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc07f000, 0x1000000}], 0x0) 05:52:17 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x06', 0x0, 0x0) 05:52:17 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:17 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2346.156787][T32233] UBIFS error (pid: 32233): cannot open "ubi!_0x0", error -19 05:52:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x400000000000000}, 0x0) 05:52:17 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:17 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\a', 0x0, 0x0) [ 2346.200192][ T3841] UBIFS error (pid: 32233): cannot open "ubi!_0x0", error -19 05:52:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 2346.496830][T32422] UBIFS error (pid: 32422): cannot open "ubi!_0x0", error -19 05:52:17 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, 0x0, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:18 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x600000000000000}, 0x0) [ 2346.504384][T32458] UBIFS error (pid: 32422): cannot open "ubi!_0x0", error -19 [ 2346.571237][T32458] (unnamed net_device) (uninitialized): option updelay: invalid value (18446744073709551615) 05:52:18 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifsH', 0x0, 0x0) 05:52:18 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2346.633896][T32458] (unnamed net_device) (uninitialized): option updelay: allowed values 0 - 2147483647 [ 2346.746985][T32481] UBIFS error (pid: 32481): cannot open "ubi!_0x0", error -19 [ 2346.767247][ T3841] UBIFS error (pid: 32481): cannot open "ubi!_0x0", error -19 05:52:18 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc2fc000, 0x1000000}], 0x0) 05:52:18 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x2480, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)='n\x00', 0x1}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) socketpair(0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {&(0x7f0000012000)=""/252, 0xfc}, {&(0x7f0000012000)=""/155, 0x400000}, {&(0x7f0000009000)=""/11, 0xb}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) ioctl(r1, 0xc2604110, &(0x7f0000000000)) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f00000008c0)='y\x00', 0x2, 0x3) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x4, 0x2, 0xe000000000000000, 0x0, 0x0, 0xb7, 0x820, 0x8, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x101, 0x0, 0x0, 0x0, 0x0, 0x8, 0x100000001, 0x0, 0x0, 0x3ff, 0x1, 0x954, 0x0, 0x8, 0xca, 0x88de, 0x8b2, 0x1dc23aee, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x10000, 0x800, 0x101}, r2, 0xf, r1, 0x9) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x2}, 0x28, 0x1) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000880)=0x14) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f00000003c0), 0x8) 05:52:18 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifsL', 0x0, 0x0) 05:52:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, 0x0, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:18 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:18 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x800000000000000}, 0x0) 05:52:18 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifsh', 0x0, 0x0) [ 2347.109458][T32686] UBIFS error (pid: 32686): cannot open "ubi!_0x0", error -19 05:52:18 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2347.110184][ T3841] UBIFS error (pid: 32686): cannot open "ubi!_0x0", error -19 05:52:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, 0x0, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2347.354496][T32755] UBIFS error (pid: 32755): cannot open "ubi!_0x0", error -19 05:52:18 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2347.355300][ T3841] UBIFS error (pid: 32755): cannot open "ubi!_0x0", error -19 05:52:18 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifsl', 0x0, 0x0) 05:52:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xa00000000000000}, 0x0) [ 2347.652825][ T440] UBIFS error (pid: 440): cannot open "ubi!_0x0", error -19 [ 2347.660917][ T3841] UBIFS error (pid: 440): cannot open "ubi!_0x0", error -19 05:52:19 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc38e000, 0x1000000}], 0x0) 05:52:19 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:19 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:19 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifst', 0x0, 0x0) 05:52:19 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc07f000, 0x1000000}], 0x0) 05:52:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xc00000000000000}, 0x0) [ 2348.187180][ T658] UBIFS error (pid: 658): cannot open "ubi!_0x0", error -19 05:52:19 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:19 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc4a7000, 0x1000000}], 0x0) 05:52:19 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifsz', 0x0, 0x0) [ 2348.187879][ T3841] UBIFS error (pid: 658): cannot open "ubi!_0x0", error -19 05:52:19 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2348.407492][ T770] UBIFS error (pid: 770): cannot open "ubi!_0x0", error -19 05:52:19 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xe00000000000000}, 0x0) [ 2348.411191][ T3841] UBIFS error (pid: 770): cannot open "ubi!_0x0", error -19 05:52:19 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xf0', 0x0, 0x0) [ 2348.593445][ T3841] UBIFS error (pid: 781): cannot open "ubi!_0x0", error -19 [ 2348.606476][ T3841] UBIFS error (pid: 781): cannot open "ubi!_0x0", error -19 05:52:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4002, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000000c0)=0x44) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r3, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f000079a000)="16", 0x1}]) 05:52:20 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:20 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2348.772632][ T869] UBIFS error (pid: 869): cannot open "ubi!_0x0", error -19 05:52:20 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:20 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2348.773305][ T3841] UBIFS error (pid: 869): cannot open "ubi!_0x0", error -19 05:52:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xf00000000000000}, 0x0) 05:52:20 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc750000, 0x1000000}], 0x0) [ 2348.971794][ T1002] UBIFS error (pid: 1002): cannot open "ubi!_0x0", error -19 [ 2348.979254][ T1006] UBIFS error (pid: 1002): cannot open "ubi!_0x0", error -19 05:52:20 executing program 5: lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x101000) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000100)={0xffffffff, 0xd8}) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) setxattr(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=@random={'trusted.', '-\x00'}, &(0x7f00000001c0)='\x00', 0x1, 0x2) ioctl$FICLONE(r0, 0x40049409, r0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x4}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000280)={r1, 0x15, "8127b67eba2474e55ad64a57669062d8bd0edcf0b3"}, &(0x7f00000002c0)=0x1d) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000300)={0x6, 0x9, 0x4, 0xffffffff, 0x0, 0x525c, 0x6, 0x5, r2}, 0x20) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={r2, 0x81}, &(0x7f0000000380)=0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000003c0)={0x1, 0x4, 0x4, 0x100000000}) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000400)=0xfffffffffffffc01) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000440)={0x41, "10d0bc28ec424e3af13bb61019995cb2abacc8326736828844dea5da4e106673b8f3a00b563fe1ac04209bcc1a23e6ccf4674b28e36428e2db343190c741f0ac7e93194cfcbc44a6637a7ec666b84e8132781edccc31a7ebb62b9642649311781436d80898a7118c0e9564fe52bff375c74dd929aa18da659f7a6ee39e59c3ab"}) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000500)={0x100, 0x8001}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x202800}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xdc, r3, 0x804, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1a16cfb4, @mcast1, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x2, @mcast1, 0x5}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7b547204}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r4 = syz_open_dev$dspn(&(0x7f0000000740)='/dev/dsp#\x00', 0x5, 0x800) r5 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, r5) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r6) chown(&(0x7f0000000840)='./file0\x00', r6, r7) connect$inet6(r4, &(0x7f0000000880)={0xa, 0x4e20, 0x6, @empty, 0x2}, 0x1c) setsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000008c0)="67f5268a52cb5b735d1cf6e7206d4e73a4a55c2b26bb062c1c2d", 0x1a) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000900), &(0x7f0000000940)=0x4) write$P9_RREADLINK(r4, &(0x7f0000000980)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) syz_mount_image$xfs(&(0x7f00000009c0)='xfs\x00', &(0x7f0000000a00)='./file0\x00', 0x7, 0x4, &(0x7f0000000c40)=[{&(0x7f0000000a40)="9b85f47cdb10e3de95a79164796e17e426d57ab051ef632ac3066babb25f11a96cecbed2c2", 0x25, 0x40}, {&(0x7f0000000a80)="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", 0xfe, 0x7e}, {&(0x7f0000000b80)="e3d1518b8d176c977ad1d328ebc589a6cf76aef5cfa69895933255c8fa2722ed22cd76c28dd27c7275c47af89b571fc858ceb7fdc4c7d93af1773ca58792226ddc4b477076122a82281c4cc4e31acb789887e88683c7f6b414d05738c9e103fe43f86a75dd486c1dff952be9f90e760dd8f5a2", 0x73, 0x6}, {&(0x7f0000000c00)="d348776651198803", 0x8}], 0x2004, &(0x7f0000000cc0)={[{@noattr2='noattr2'}, {@biosize={'biosize', 0x3d, 0x4}}, {@rtdev={'rtdev'}}, {@nolargeio='nolargeio'}, {@nogrpid='nogrpid'}, {@nolargeio='nolargeio'}], [{@fowner_eq={'fowner', 0x3d, r6}}, {@subj_user={'subj_user', 0x3d, '-\x00'}}, {@uid_gt={'uid>', r6}}, {@euid_lt={'euid<', r6}}]}) mount$9p_rdma(&(0x7f0000000d80)='127.0.0.1\x00', &(0x7f0000000dc0)='./file1\x00', &(0x7f0000000e00)='9p\x00', 0x0, &(0x7f0000000e40)={'trans=rdma,', {'port', 0x3d, 0x7f}, 0x2c, {[{@sq={'sq', 0x3d, 0xf70}}, {@timeout={'timeout', 0x3d, 0x1}}, {@sq={'sq', 0x3d, 0x4}}, {@common=@loose='loose'}], [{@dont_measure='dont_measure'}, {@fowner_eq={'fowner', 0x3d, r6}}, {@pcr={'pcr', 0x3d, 0x2b}}]}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000f00)={'HL\x00'}, &(0x7f0000000f40)=0x1e) [ 2348.998725][ T1006] UBIFS error (pid: 1006): cannot open "ubi!_0x0", error -19 [ 2349.033073][ T3841] UBIFS error (pid: 1006): cannot open "ubi!_0x0", error -19 05:52:20 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:20 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:20 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2349.246645][ T1116] UBIFS error (pid: 1116): cannot open "ubi!_0x0", error -19 [ 2349.252116][ T1057] UBIFS error (pid: 1116): cannot open "ubi!_0x0", error -19 [ 2349.333350][ T1145] UBIFS error (pid: 1145): cannot open "ubi!_0x0", error -19 05:52:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x1000000000000000}, 0x0) 05:52:20 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:20 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:20 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2349.334150][ T3841] UBIFS error (pid: 1145): cannot open "ubi!_0x0", error -19 05:52:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000880)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x4000000009) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$isdn(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0), 0x400000000000293, 0xb8a9575e2af57f7d, 0x0) r4 = msgget(0x1, 0x32) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000000)) [ 2349.628344][ T1255] UBIFS error (pid: 1255): cannot open "ubi!_0x0", error -19 [ 2349.635753][ T1298] UBIFS error (pid: 1255): cannot open "ubi!_0x0", error -19 05:52:21 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2349.672836][ T1298] UBIFS error (pid: 1298): cannot open "ubi!_0x0", error -19 [ 2349.721937][ T3841] UBIFS error (pid: 1298): cannot open "ubi!_0x0", error -19 05:52:21 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2349.905706][ T1494] UBIFS error (pid: 1494): cannot open "ubi!_0x0", error -19 [ 2349.906499][ T3841] UBIFS error (pid: 1494): cannot open "ubi!_0x0", error -19 [ 2349.993160][ T1540] UBIFS error (pid: 1540): cannot open "ubi!_0x0", error -19 [ 2350.005350][ T3841] UBIFS error (pid: 1540): cannot open "ubi!_0x0", error -19 05:52:21 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc76b000, 0x1000000}], 0x0) 05:52:21 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 05:52:21 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:21 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:21 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x1, 0x2000) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000007, 0x2012, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) r2 = mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xa, 0x8831, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)={0x0}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000009300)={@rand_addr, 0x0}, &(0x7f0000009340)=0x14) accept$packet(r0, &(0x7f0000009380)={0x11, 0x0, 0x0}, &(0x7f00000093c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000ac00)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f000000ad00)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000ae00)={0x0, @loopback, @initdev}, &(0x7f000000ae40)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f000000b540)={@initdev, @multicast1, 0x0}, &(0x7f000000b580)=0xc) recvmmsg(r0, &(0x7f000000f440)=[{{&(0x7f000000b5c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f000000b7c0)=[{&(0x7f000000b640)=""/117, 0x75}, {&(0x7f000000b6c0)=""/176, 0xb0}, {&(0x7f000000b780)=""/40, 0x28}], 0x3, &(0x7f000000b800)=""/19, 0x13}, 0x7fff}, {{&(0x7f000000b840)=@ax25={{0x3, @rose}, [@netrom, @bcast, @remote, @default, @null, @default, @remote, @null]}, 0x80, &(0x7f000000bcc0)=[{&(0x7f000000b8c0)=""/98, 0x62}, {&(0x7f000000b940)=""/232, 0xe8}, {&(0x7f000000ba40)=""/120, 0x78}, {&(0x7f000000bac0)=""/44, 0x2c}, {&(0x7f000000bb00)=""/41, 0x29}, {&(0x7f000000bb40)=""/118, 0x76}, {&(0x7f000000bbc0)=""/9, 0x9}, {&(0x7f000000bc00)=""/172, 0xac}], 0x8}, 0x1ac4ff56}, {{&(0x7f000000bd40)=@vsock, 0x80, &(0x7f000000c040)=[{&(0x7f000000bdc0)=""/246, 0xf6}, {&(0x7f000000bec0)=""/66, 0x42}, {&(0x7f000000bf40)=""/80, 0x50}, {&(0x7f000000bfc0)=""/28, 0x1c}, {&(0x7f000000c000)=""/28, 0x1c}], 0x5, &(0x7f000000c0c0)=""/4096, 0x1000}, 0x3}, {{&(0x7f000000d0c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000d680)=[{&(0x7f000000d140)=""/51, 0x33}, {&(0x7f000000d180)=""/225, 0xe1}, {&(0x7f000000d280)=""/89, 0x59}, {&(0x7f000000d300)=""/23, 0x17}, {&(0x7f000000d340)=""/30, 0x1e}, {&(0x7f000000d380)=""/6, 0x6}, {&(0x7f000000d3c0)=""/224, 0xe0}, {&(0x7f000000d4c0)=""/221, 0xdd}, {&(0x7f000000d5c0)=""/173, 0xad}], 0x9, &(0x7f000000d740)=""/92, 0x5c}, 0x5}, {{&(0x7f000000d7c0)=@nl, 0x80, &(0x7f000000d880)=[{&(0x7f000000d840)=""/46, 0x2e}], 0x1, &(0x7f000000d8c0)=""/222, 0xde}, 0x3ff}, {{&(0x7f000000d9c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f000000dbc0)=[{&(0x7f000000da40)=""/187, 0xbb}, {&(0x7f000000db00)=""/134, 0x86}], 0x2, &(0x7f000000dc00)=""/157, 0x9d}, 0x10001}, {{&(0x7f000000dcc0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f000000df00)=[{&(0x7f000000dd40)=""/211, 0xd3}, {&(0x7f000000de40)=""/46, 0x2e}, {&(0x7f000000de80)=""/126, 0x7e}], 0x3, &(0x7f000000df40)=""/255, 0xff}, 0x6}, {{&(0x7f000000e040)=@can, 0x80, &(0x7f000000f300)=[{&(0x7f000000e0c0)=""/138, 0x8a}, {&(0x7f000000e180)=""/224, 0xe0}, {&(0x7f000000e280)=""/4096, 0x1000}, {&(0x7f000000f280)=""/78, 0x4e}], 0x4, &(0x7f000000f340)=""/234, 0xea}, 0x3}], 0x8, 0x0, &(0x7f000000f640)={0x0, 0x989680}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000fa00)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f000000fb00)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000fe40)={&(0x7f0000000480), 0xc, &(0x7f000000fe00)={&(0x7f000000fb40)={0x2c0, r4, 0x0, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0xb4, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0xae, 0xf6b8, 0x3, 0xffffffffffffffff}, {0x5, 0x81, 0x3fe0000000, 0x1302400}, {0x10001, 0x5, 0x2, 0x3bb}, {0x3, 0x3f, 0x9, 0x9f73}, {0x8, 0x0, 0x3, 0x7f}, {0x0, 0x1e7, 0x2, 0x4}, {0x3, 0x4, 0x40, 0x5}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0xb8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}]}}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r13 = mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xfffffffffffffffe, 0x2000000000000050, r0, 0x1d) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0xa0, 0x0, &(0x7f0000000300)=[@free_buffer={0x40086303, r1}, @decrefs={0x40046307, 0x3}, @release={0x40046306, 0x3}, @free_buffer={0x40086303, r2}, @acquire_done={0x40106309, r3, 0x3}, @dead_binder_done={0x40086310, 0x1}, @transaction={0x40406300, {0x4, 0x0, 0x4, 0x0, 0x10, 0x0, 0x0, 0x50, 0x30, &(0x7f0000000280)=[@fd={0x66642a85, 0x0, r0, 0x0, 0x1}, @fda={0x66646185, 0x4, 0x1, 0x24}, @fd={0x66642a85, 0x0, r0, 0x0, 0x2}], &(0x7f0000000200)=[0x78, 0x28, 0x38, 0x48, 0x28, 0x60]}}, @free_buffer={0x40086303, r13}, @acquire={0x40046305, 0x1}], 0x46, 0x0, &(0x7f00000003c0)="6dc6a3aa184b8049868a1a29b51653aa21949ce9fbee2869a88d7497df44d0a8e7f3b2056ac26eff6ed4c3c0f52f5d4f40b083fb0fbec64dd7340ef9775f2d2e869c14177096"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000180)={0x3df3, 0x3, 0x40, 0x5c9, &(0x7f00000000c0)=[{}, {}, {}]}) getsockopt$IP6T_SO_GET_INFO(r10, 0x29, 0x40, &(0x7f0000000500)={'raw\x00'}, &(0x7f0000000580)=0x54) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffa000/0x4000)=nil) 05:52:21 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs ', 0x0, 0x0) [ 2350.232306][ T1593] UBIFS error (pid: 1593): cannot open "ubi!_0x0", error -19 05:52:21 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[]}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2350.251795][ C1] UBIFS error (pid: 1593): cannot open "ubi!_0x0", error -19 [ 2350.317283][ C1] net_ratelimit: 22 callbacks suppressed [ 2350.317292][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2350.336702][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:52:21 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:21 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:21 executing program 5: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2350.549215][ T1810] UBIFS error (pid: 1810): cannot open "ubi!_0x0", error -19 [ 2350.550058][ C0] UBIFS error (pid: 1810): cannot open "ubi!_0x0", error -19 [ 2350.567752][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2350.570856][ T1811] UBIFS error (pid: 1811): cannot open "ubi!_0x0", error -19 [ 2350.574030][ C0] UBIFS error (pid: 1811): cannot open "ubi!_0x0", error -19 05:52:22 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs&', 0x0, 0x0) [ 2350.576149][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2350.603773][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2350.610069][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2350.616578][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2350.622646][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:22 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x4000000000000000}, 0x0) [ 2350.757642][ T3841] UBIFS error (pid: 1819): cannot open "ubi!_0x0", error -19 05:52:22 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc787000, 0x1000000}], 0x0) 05:52:22 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='.bifs\x00', 0x0, 0x0) 05:52:22 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[]}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021965000b00fe05e87c55a11400e1730000c5ad4fda0000000000000000812fa80005001b4163e3e53db14ca0508ac1799d58f030035c3b61c1d67f6faf7d71348f6efbe06bbace8017cbec4c2ee5a7cef4c02631631fb791643a5ee4ce1b14d6c930dfe1d9d322fe7c9f8775730d16a4683e4f6dd457c0b03c10964c360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace80ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703db0de796ac5abeb3a79dd14678", 0xd8}], 0x1}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r2 = semget(0x3, 0x3, 0x40) semop(r2, &(0x7f00000023c0)=[{0x1, 0x1e7, 0x800}], 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x467}, &(0x7f0000002280)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000022c0)={r3, 0x4, 0x3, 0xff, 0x81, 0x8}, 0x14) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000200)={0x2, 0x0, 0x2080, {0x6000, 0x104000, 0x3}, [], "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", "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"}) sendmsg$kcm(r0, &(0x7f0000004680)={&(0x7f0000002400)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000004540)=[{&(0x7f0000002480)="ce5a73711991ee9e7bcb468f7e44cc4c548a92735f0e9a6dd93c6a6bb08b1658b61f8e9934319796eda694de7f68cfc04fd9f0ec61856c3bc2d2a1e0c72e4c88fe741fe6f6ff3565035cfd1f3e1dcaccea1950ce76425e6561a8c502dcb52c6bc7307c72eb5343220d43129dc32c741a969c6fc71462ba7bba1864db9cde448c7869860540cc8d25e437b43b7abe4766e44816c3e7bed025d4c0ff5ef97b848c0b18ec68bb01f61470933162b16c1c1a235bc03098d0ce6f4fc479c69cb8ae7c3c275ee15cd0ab2f37eed720e81f432b3ac9b6d3434a11f5ac31c945746f03fa39439c1c3bae5893d2d5a5c4c842fe78f8c0d7ee9bc9ae2639359fff1e4f87c46cb098864ef6dab1977d857e3b3052145dc4b85cac0ff59d8bde498ee2d090d8c538786cf40666663c51585799d2e391b8c67fca183c548f756b2931a935d033d0700ca18c2a0f324a72558b101052251d3c6c2d9e7556f87e49407db633c84a6be4863740eb3e55f92c6d8b688353fb56cbba1640a8f4a1401c3ebaa7161c9610b296f20d6149542ac7233fd2b60596c7d0b845782cd7830d9251ae24c25daad396109ac5af8729d2a0137419e369031505f5996da8fee2c84518c4cde851455b14250a27a34b4e2e73776d8a1450f789ba3782f403c4e23901d526019edfa62e5c5825269abb4f8d3bc85009dc90f938468cbd023f1f9d9ada83f8ef74851a0d0426d7504ec746a9080e0a6a45c3ec34ecab1582d22ff5e192284e518233e046dfe49b4ae6353f3b0a5307f6c9d32f1bd7ee95e859eef8c0a4a97c1250408e4f3abea13229cbe831f17a5dbe157a590ed17dc7e963dbf33a941a7c6be471208091ad86bf8c14d1c3c4d9bec182801cd5fe58e545db58189263971d167edc0a1ae465ef48d73ee247d4fbbe2276d66b70009ef8777a9c0c26cca7ea6e1f3f040ae6b7af45ad92dbe00bb28fcbee8f47c4236587dd2314e8d198a2ef2a454e30349177e0ecb0cb0c25dae3dbf04202e8e1cbdb396ce11e0666924e144ccea1c96110c0784e8229a819ed3d4fe44905c4ee441f40e3f7bf90108d9ac2cc8d699b1125af48bff8548f30cc3c34640b8fa976cd35bfa81fbe170b22cfabc318c1ff1392ce07e52d0167e3b9b2116d94ad6ea9fcb228e55cdce1710450c877f9c40c72b7f42a4441edc1ce666872bf10c8394e27295a6be150041dd0f099ad46dae60aa657ccbdc4147271c01255acbef8cfe538ed5a95b52a9fb00d53bc8e515b45544e6a4cecac419569eabb30f0f91095d09aaf7d2b9c67b44d7105a4f3f3aaa6dc7ca12b2287ade77e7c58b8fbc0455d40771455259ba61024208868c39339fb2c4b5aa5721c790d143e230a737d40a5fbeea8b888e1520c2964958af20dd9139a78bee99ab63549cd89d121cb5164689a195538a42605363b6a9b611242f3d95affdfe4ef6b2092302301b3a535917ea006be1cf1bedb1cd549900a1db550ebbe9bd85c62f46dec8a829059bf14104bba4b15c20aa9103b68b8dfb3b04d3adbca0121d9c2a1ac691d395459a407f3fc53ff75f66963de879b515e57e7452ad63d74ff79a93327f90d2cdb5bde70320ed3b6bcda9eedb9f604990e64d8e09e3eaecad43841caf465aa04154a856181761d43e452a5dba402391367ce80308760cf8f3ce1a6f68598a5c8cfc4b96d4cb97859448b8efd7ae87b98f8c39d6ce1c5eeeefdd3e23a6d6ad5fdde4aeb44af0ef98430a080cb340b71ac5c3a8950875b8960def08fc7c39ae02422b801c87949143970356437c25c1575743f410a566f4f51c99ae63701e541edfa674fa28ab8fcc086bc080354f22ad3132cf8f466c61018e7abcdbdcb00f7b825814c209d32b69ad5443d81fbd37fd997dc2860dd715c7ac3644434522a28a508c4fdb6112920ea4105d18232bcf7b7fc21e70da20522024735eebdf30f53d786c36376eea1a47234a899674a331cdcd79e74a07046a1a1bda107a0559dafb7aa7cf8854e473b61f2ba951dac6569fbcc8c444a6ef32e116d2893929c7368a28526de496ad587f8eaa8c3f6fba36896627c0a9354575fd026014fa370eba88eeea482953cc7fedc4993880cd91d7828b96d9b468a045d64d01d4cc1609ef52ddc4d349ae558f639de098df77c100be6c916abac6f55c6b66492bd111e41d86d2e6f00866797e663a7ef368c472606ca56befa899db6035765f9d8811169304edd87a9399961b5b8d06f8c1fc9f4658c43178f253438aa748370fb73cac95d51fa622e8cc9778bb1b2688a4a6a8d95c4071a07f18f6c2900cf3070f11463e0f96aa156798c430be11f39f3c9dac958e4e1a479b461ac3c7cce979c0754d5b6ac3697b284ec2a91b764c84b18dbbd558f6b5bc9336119495d3bb55c4187c99fbe5470933747c2f3a408d78b721a37c4c7fa6c6c091fa74a867293dbebef09cf44f240ed3da2280d1baac4ef09997485b7f2c68420d4ea91d2148b5d7c7184218d733fcf1dbda84841b776f8f1c39ab15dfb5c7ebcfab5e8321b8400128f21d9dbaa8284f865e8af0a41f29038f99adad031cbdce14c5686e4378929a3f71d24e5144102aa97973a34f8e6c50d8c82158d8867d7319423c293a960374fbaa919884444e0086f48711baae7a7bdcfe03fd1903b6d84fc18c9544c999f8c30ac7b8f2b57bc91a98b2cb0bcd734c5e33f36f3256395bc3f9c5bf38decf6becad1827d662ec417e6184711c10c1898dbd3ae4d885ef790f548a5541ba8fc9d4204635d546811db5d82038b620c388ffd7e819bdf3c7e353c69c43bd9f6957f816d0e4b8a5ee35aaac41a7f2e0cfb261e0ce5a7e266e15e8343c9cbbdb26544a6492c3033eb4cd3680f4b848da9a80ae2db7fee19b7893e11ecbab5694a0894642c3c3784daa6e89281aed2dade7bfcb5f8b83b58b516d94fc5b8d50c91960024a228c875b36119a84b32cf77bf9503c16f46dd53b0888daff4fb0b5145a825ab82b0f1dabc01bd8a8a5ca19c3657b360c590e29eeff0505d35fed5ae68f8c6ffa84d6d4191c2d51be37c70448326e7b23776d24d26e05a47ace392aa9558452e148d147bcf9c2f1ef4552c62190cc0b32f5dc595f554f94f918dca81bc80e3613824a8b0b7ebc10781fa58bca6f3672bd7c96a785b59a0478782d2bbd3fd4df2dd77eb3d36b50a79484be374cdc06f48da52f0ef03124507e740e916cb134ffbd4b81b3e95ebcd8915fb2d9308ca4002fcd9978bfd1fadedb16c8639e9eb30d3819ad45eadefd0000490c28df5bd23cb29f337a4f0e3c590dd082066b6ca6a05853cab7c46f2b8015de1629afb9b3075a9591b8ffad335033a1e475bd53c0787e3fdb91d22cd4535f736b28149376cc05de0ab4e5879fc7372bd77259d49e7d539a13a6522e856380d4040c83ea0f260d9797e391e720f2ba2c8b3f96d261d04d61c8a1450d177f182e0dc796fa3e5c843a2167b52003152e187fe8c9a68c669cdb7a10a75fdc441c0ad37b2297a4fc3a00ab5e41d3ce7dad1d546f15c322413a767f5c135ed032c74373faaf098e18c29d19c4fd3f3f4a7d43bd8d06b8c8a40ca57b81fb41af95e4ef902f52f64ef23a922417a3625e1152e6916d690a60d45655a2e009cd87c2ff13ccf937178e8ae551d7a10dce32b3ac53f6ab922743e90da747d95884a8e8aaa5c372c61dce877eb2c1f115da476fcca289e15ff3f4179a1da8d06dcce3c454fbeabf103df1fe307d11670a760de32efad9ffd89dd9b98fc956485f4410b7d21459856a09affe08d75faf07cfb381bf1e24cd15e3fc49589a2ee329a371b5a5e713f738f71e88d4bb46f3a9cdd806cec8d312221954f6878357cd37d108abcae822434e44dc98cf9af5691fac55bf940955ba0abf079f8110e4b46a6f357cb56411aca1744e55b8979b41ba28f34af1006e1d40336c6f51a3d4c6beb0212e8fc009ef2dd2b3fba9e90edad74ad698beb197bbf7513c5274752d2f865f72d620f8726bccaf7d1e40ed0d289593c2004b1c4f8a290be6bc625415ab0c5e75c7486a9b4377991bd18e2cb6381a7cd5276cb94730340b1d7bd2f066bb5fd2b2e8bf7f8bca7df40413e5339658b2589bbeeb2d5f895dc33b3a07edb30c4607861e3c2b23a95baaca9c58c343a5469bad1e88641ac4e200b9f841d38f140e235fd95fc537d476c8fb56eefa532e906d03b5678a6cd14b097f9cb8a04d19208e21277a29e0e7b598e55ac482483d54c7983fd7926a8c17dcc22032e3415797a51fe6839805e9a409d51537190476ab9b51efa930a3b88f03549bb78148e04ec1a80b690ec7f5178e8ff0a9730b89f6c1d54f36ffa8d385ba4950c723f9a62aa38ef293823cba439c5d66632fd36f0344dd1fe38567883efee0b794b039207775c68953bf06ee93b724b9498c2902da4b98e31b05f791fc303d188709aeb179ba12ca16fcd8aa3672fd480df7181a1dade415cf50ecf4d4dec85a79881390264a2b9ac2b8168690ec5e208bef8eb0da78bb226222c6b5c0af93d84390ac9c29ff8447c44bd6e0e2a09828ab13c4a4fe55931c8bd9b697c86ae0956487cab0eb742168a142397d1f4cf7a009da17579f3e7140225429c9858f5265142adaa771757f7a443117d495c7cacb07828249175b26def4b8551bdd90532daf560c2e2a1d40f7d6cd37dcaf9d9c29470e84f2be26c866d44c20fa1e6c751783f140436aff7d90376932f728624308fbcc8d1952805312fbf94c37695b3bee8747d44dde38c18283f522090c7d44a95f3001f3497ab0c789c1dc5711f026765d1e42e7c2fb6a28a324f51574a03be6f185d485fc5052c18baea8c00b62d571cd3b169e698084051e41cca99451fd194786b0b933e85a66a702424f928798c084918a9b1f4030039cfd664e4eec711204f9c8b7090f26e0f10b8c1afbf01c6b2911cf2487a13e429c07a4348bdc7ed5c90ae08d1987231c8600cb97405a870f9dccd65d5f154cad7b45fd8564502bab3857c021331e83f7ee6ef5f9e55fb01c9e96a6807c772476943c8ccbe4c8f73217f2749c8b3dc2a882339e72e61f2a54c98417a570df4e4290c523d682f3b749a9cc2ea50b032f552291e55ad3ea8275fc3d2424ce6266e6baf1d2e0413e6063078bce8fd920286ac327bdb11c5108fc2a981040b4f18629c651c6f3d5a1e0cff968a839a9984a91185bf88acfbe01030afb2c0f297b42e653b858fc6c68d93891909a29e336a0678a75c9fba8850991c980a7382efa71ae25bdf0d5f6b730e24cad9464d6b8235b19849f628e8c05082bb3ab42611bc93dedd9b5b28df9382a62312bdcc26bb70d93790c79135436e85dec9b06c74511f5c4ac976c73ae7b02ef1c7db0d61a47bed0420bce24f8286f3bd4f3fa20c7565843c54fe8aa8d886b30634ba4d60f83a0505ac45536d55e5bc9e2b35000aca673fabba0adcfddcf342ee0dbb6d3f22f7096ca8ea965e568db647463901a7a7d73864a767b12aea58a087e864b7fe5315baf101db080946c1fc903a9f8ad2a27ff27fb045d4ea87a5ffaaf9ace678d585a65e74bd5505ab964b149ac13391728720a5b4320ed12c6fccf98148e8f8c9e3eef9fffc247a847508075de6852b4c9246cbc8ec678ed3e58c1db73f0a2efc20b70021502c61d3d8df09f95576030d0d6700e9a0412ca62f68df039a792b3ed44ec86a9b115536af55578df956d5670c54f5022a0cb006d7e7f1e95ceff21abc8f806ec29e40c6effa479a79cf1161dd4ac46905aaaa61a3d59048c0cf947a85763d", 0x1000}, {&(0x7f0000003480)="8b6f8a17cff87c34614522fb7f49f5031b5ab2756ba7fdcd733c93c74c642f0f846ed5cf1054e3acc209f9ac6944ff2f98190913334a5a6beae726bd28c445bdad2bb3410beff02b2a45bd5983bebf27977d684123da025366fd2aa22c67dea7c790d43d412551badb5dff92f99bdded907946330efeea716686c5b13efb6170b6f98b339e3bcd2e0f6735930c28030f0b81b4edc4ef5b7987b2f8c5c1a6dab2771e968f0e21c28e23919885d36f5fab4b6ed36f6a8c93effaad1e9227", 0xbd}, {&(0x7f0000003540)="213cd7df1b9ff6312d5aa310d45831619fe9bfc85ff92c2dc0dce0b4b195bcb35d4a236ff1646c4c960dfd176f8ece2e114eebbad48de8e45246127594ba91ed6afae35e10456fd28c285862119826e3500e15ad2a8dc5a2f0d11e598c47da2a468ae0903f1b13711f9298dd90c22b69f6359cc797eb6144503df6fecc26264fb21f0dc66272ec66e14f6c6212264eee9533deba75c53d5023644bc305c8112d7c7d3a076c59db0d1dce3dd65d3643dc84bbd3c34bfd9390ddd3666c3be3323c431d2f8d79480092193dbf2958a6ac8b5a0f9a121b02f2cc8225212694e7310d56cc7d452864792d1c07a57875077bc53a1d1e4088bb083b64a838f7fa91c46456e2bae8092bbf256181cec447599767c89008d0616388effb11499c10d07cabe514f1c726467f57795323ab7d9efc4b8643d64026316f9b48b6c4fd39bfba3002ea2ef4b32a04ecf15fae135f35fbbd949a63c362aabe9b10617621cdacaa7b19ff636d3b24e49a09fd25145cb6548b311e71d17a9b0a068bdb22194c53616c30e62fe36211bb72a62e88ba67d1d1d1b055f49d0f224280e166c6a95f16e3d95d1f4baeb2f2fa9e954660cb0cfacc2c872ef3a5ae6a274e49b095893b8d45c84a5a8ae3172ea95699d77fd0b13a12cb554d3163d7d3b3ea7a3ffbe7ed9e635ab70e51a5020b2d1c123f7ea4e5540ec88abf0da11f2ab7e02a47aad1df54af42550e5a6066d976e498643b3193d87f55dd9c15c8e7f49c26ab26330cbfa8c94e6054c3a70b2f92985631a455c413e0872d9a02b6b681c0070a7218e552575074691cd3e562e9c0922de03c976c986b069ed65998804719fe9a10f2d59cf5d11cf96b7a7e6359dcecf6b3724a79fe0e4965d9c8c3676751a576eab2d6a91969b2d5558d6335e7e7a11388f391a71a8272bb1ba004714af50db8b9a31d75f8bf3ccb94b405e27ef4cfa839c9d74285fa34e872cd763b7794ea70b4a0ec12e62512b667bf33c0c2db46e0e28d264b67f63cfde62122cf7873fa9390d54cf7d88ac4ea621493d5c43a953ae6a10d0e3c8cf88d95c8c76a405c51815d02846df6818b46c4c67afbfa38d4ae681e0707233033fe28d1a65df96a53b8ffd07614c514c3730d2a8e11e786b6636b508cb36c34245dfa67dfaafefb14bd7858393df6203654abe02a1b30afdc0eafea8eeccd1c8a91885d5ca06b24253b65d8372931fdc2e859bf63c4406c7a8068d43a2f335d9aad023cdce2eb48d8fe3f50821af6aaf45e57a0ef09e6bfcaf899952f74a564eff6ac96b494a5823058d7862c51624b855dea0f542e7537e76d66cc035270b653d72e5716b0a11905301f5b9784ec0114344bdf099a20129ee895c8fca367715731273839cecbc8672202fbda79add427222dca83338bea19281c4a3d1ec8a93a1adf0023b618441bfc00900024f216e918d9447bb965dff298e2280f7f392308ba3a6974e42249828544f159944deb7b8d890ce9d5074f032a37cf82b127906910a4700262c5d100f55e533e2a17c6eb33afa06aebd81b0d543c1c3d8d4cbfabf5614dff55d210d924b881cae29b107298ebe8c3361650bc8a76966b0fa886da5efd22a657616618a1b37594e3f881beee70a9470b74839f09a2951596fa7ed78e610e5770c9edc93d117fe787c51acd0cc991f99e5537af11946ff3c5bc68ea5bb783909b4874d1f7603c68f8238db0bf52adba708c8e0fb8a369d495923667edfd0f4670ebc589889a6c72150c1a47acbe8a6e20b66cdbef1594a2f5fb208f42c3313cce2998a3d2cc39bf35dd0474cfcee4e3a1abe7ed55c6d8d2861e26fe5ce65080f34e504fa638cf3bf5a44cda707a6d2a37bf692964136a3dc18b89e962afabdb614801e3930084c75a3bec7acc243846c79d5a0ce7966c617ab7105481fc760baa472a9d6b57c089330fd8056fbcdc48fa8ea7bf4242bf89ed13cf0e9a6a9245bda06a08bb5becab30236bf9e8898c338ddd17ca83f13f2800171ddfb9565053460789411761dbd30bb631d2826e8c29871fa6fb79289f6bb5a34fab5669253264c27b7214e9cb9924c27e50431b1a47d108c2f43acc9a6b9b56be3ab2fb2e8fa6b8648c4f092584ca3f8695be8eec182d30b6bd231ecae11879fc10f343731f13a3e6c4b37641e50540817d79521860b20510060a9fcf8c30ec31dca226e59484bbb0180cb05d5dbf88325b4a3befeaa005ed38e56f3472a367fc7d01a9b33cf5ff268b2c5fede3ea95b2ac162d33df664c612900de3da28f03760659cc48ee5f0bb8560c7897915490a1282ec67730708a39c27f93663fc357179340d931c06b43102c03339c54d7d98f5d97a654674c0da495408bdd9dd2c18c7c9e588ceff85fde0c29d72f6a40c703508e59c03b2b6115dd7d349e691fca622734d06ee2fb98f9cbb4fbf28207c515e8973e2d5b49b57f05e8ab54db41ab9ddd4e65c171a8382064a8af617d641d15adab5b433a042a586e2ee41ebb7f491715f6cce65ce21bfaf3cea20651a6324709d9853c12754b52f859226907a16d2add35fce2b3a826d708674707c8b0bd9cf12e4fe0552113cb69bc7684f2eff5ef2058598260d6658e76d352e14a7fbdaea83c8c18d4f362db16a1c002e2df0a24f56f48690108fff034f53a9e7380947745d53eb0ea9946f90d1ce44b1eb07b8efd0f7e466a7ec0dae0fa4fcf5be40f31880dad036880d56d75406d705de060c2f10c4382b5af4ef03895c45237d9bf3b59a1d69f538c536bc6a39538aa22501b854c04656b8355fe80343dbed278f7d0d1e310186970a3573b0d7485e096d6d4b0532984eafcb3be3b61d55785feada58567da984e4fc003a455e8d7619581fcce03fbaf8a428e6b70cf0ab72a72b01b9a8482f56d7c8916741b6e0dbbf5f5de9d72ffb8a1d4f1bd67e125bb8ec91fbe6ef84f44b4bb6b1b11d501b2a31e6ef74eed5cdf860e859f1a72e1fb4f32768aadaf4471af908c22b1949d34fac47ccda2ebb0ac2c78da278e8de2a6082361889e4787a81c071906fbd3c4c6ce5fb2701a6bbad235a5495f06bd7a410aa6e3d6d939fe68e6706bf9c04f2fc272c3e08d3331c1eaf967a7619ad42d515bf2930cd91e3f23e9021177f116d367e23a4fc69526e9c4fe5f44a9773e3b278d3ac379494bc435d5f5bc187e139a7d8129908a10ab14d183ad81d05a6eaac95cb925346c56a791d1f7a048fec73e732a468b2a43def3c991ae2ecc2c7b8552172898d28a28c336dbeb576be9a46e74d7f4d4d84f6af365f1067554ca6f0df115810bde75dca05b015654f6a5133600fd3a67fd0cd3b9c1edecdccfc3c0367f17c0331ba3aa3097e3b166f4ceff919d7a98498b817a95a154cb8a7ff1539beeda2d0c85a72728c22277cad281b0f7e947754d3ebd9b2a3b5142de216d42db8d768cfca39e6a4c10f44871b21b7d426d31ff95032e32bc5e3e4bfee2cc123179422f7188c9bf4a96dd5c42be025bd710316517887c2188412ce8f2466d2bb546e776b2949bd3d6d35e455852c65c8a59d708c9c188c8912fb396d09c12cde3f661915b1898beaf7d52591bf610c8df08a9bc7c1740afd95d401fe8d8dec31a754ce982e4cb197e4756e419f470c2b42f7468441e1f8f8d2fba31ead7a0276341eccfc5a6bc60825cd5945db1623ff5ed88ec55bb319f618b57b51590577a6abbffabdfed64e76c0810adef8125ac98971498bc021f9e5abbd9711cd7c3d9b7bb0f2bb4e310046f031ddde1fe9b606156e4d00baaf8a6dfc997133432b3a66c85b36734bb360de0def7bd5ef0f66ff57fabe5844b90fb49d31e79e78b25fd78929fa88a42b373a46ceecb6eb0776a472b3dbefd1474796c760eb783d04be401df3392eeb6cf03caa44845efee1a32f183a699e7cc0056a60b79a7a55f10419e9400badfa3fa8631779f1f8f90ec419055ba411f8e4a59a8a8e4f9bab5cb3d1a3afa3cc9553580d3c25f5297d9efb12bfcb09baf170ab5de7ca69a8e9133ace9416a38e18e69e3c46325764969eb3ba4e46b7d5ad551d131060a5764b8200c0851a7ad20c112d8303283f7fd145896ed94028ad522cc57b1fdb63e7a1cfcabfeb0c0ad6b472ae3d535a730dd057b324d8fb0e403034d036961099331ac6ea85277d7efaf81869801e120eb09da46e9a769bf1b64408fefcecdcbd38d22b02cee0c3fdf0027f5c1932d84856eb68bb79af22be9340bbc4814f837794a6004125922584a44a43b9c3c8eedd889048142ce495581d0ab52fa3f1ce727675c30f6bf6810a23d86364d669a54ea5ac1dc52aed09495be0dd5b6e56fc39e015ca31dbbd2852bcae84e95ef850527b8bc11a34e4ca012c54677bec1ffaa52990504a4f8137362304aebe1893cc2ffec55eebd05c04a34f96956fb1278f9f5135c37ce320576c695f293014e845f254d75810014b10e23c56171eb3571526bd0dcd7720c3a7d846fa13c4a9e07e2d033ebdeb0db731805cc8ad6b8128f6791087d2dde733a5e758bc064d0603ff6674593eb6396da632daae020e7245996357c6154b0a5a6149f08c828fcf8df7abb54b3ce49c403a5fce120c5507c6c9fa15c318f4373aa1edfcc440f2c4b31d51977e5c066693df263f43c4b1b66d3a1210b3dabedc882b1893c07b832d836d946175ecb25756b4d94eecd82802084143c7680be54e54d781ed871807922d43b314f78c6ea48f99082403e62ba0bfd3d88f803a1138281de8ec9954941620a459940b337f6289fac5a2f31a092ed02e4675efc968d52067b29d7f3f08773b2988986ff9dc724ec469554e04b3ca9327e1adb18b39b3b0feed778fae144ad95c4ea45bf8e036fbcd52d9c79561bc745a170616797c7f245abfa93356d9b1b3706b1fbf3b9d1c3deb7b84bdc9196d76a965b1f65a0f4b43e8884eebdb9511aa7519449d4f74244a830eac1d520d9f9ae1ef5d7515ecdfa85b110430c039a86239d7ca7d764dcd3238f22e31a48798e55c507c5e68e12dd402ca1e57bd54cfd86bfabfb51275257879d16caccf787ffa40a6668c88bba31b54a4ebbe48e15ada50982f2023759471136ac2a95ba94715a4d8591538b1f0ca143d4277bdb9e49f8d6c68d7946705cd802af3a1b8f895e4a31adf670a9f75e3842eae1667e072d41ec3f283b4f445de69c3936acaad6f7365099e52a1c5999a918117ea2753bc2af5a36d6edbb01e7db21b41defb9a34458e75def4a638616e21f0678885bdf5789458ec650249d883c7aa464ea318013152d190d32c2ebd73aa44dabdfdddf1a3790e3d0a065b5a5c2614de55fa8eec26c1321702146037cc22c9f8bfe1fbfe0dc7e52e0b5023940138a7d9a1ac5152aedb5a5fad4b6d71631991ae248eba8b884bc0a9ab14a25ed416dd7820563f9a693bb3b0d5002ccf96b26a6def2c8ef677a5f5f1936124fbdd6b12c6e81340b824c4665b48146aa0466f103f13ac205c64773c56b52b9f45cff05381172974172ea1ae20338670ef20e623fb6f34d68bf3790490bc2961e62accc30b763e79e8b417d63bfe78f3592d60574abb726cdaa32679f12ab156552292c584fe15d8139ff38523977003e82c66aeb4967311bae8af2271027418b25c33d4f37191b48e13cf1a48b5cdd76a3036552985572a432ab9eb319abf9e6d71dcff92df71b871298516cfc833ca1c4949ada47c7a35683865659e0fe24b6c052f0c919e219e605824de0b9777df47fec0d1eb308b5e14d309eb099b3a57ab6cdeae5f773dec2134fdfdb6f3ba6fe6375c55c943b56", 0x1000}], 0x3, &(0x7f0000004580)=[{0x68, 0x105, 0x2, "e87bffccc29d857037b078030cd56fe7f539721cba2e1fc9ed3d185e19ce9388d41e39b3505a8b4e39abfa65963588a1eab3e6bf94c7319516332b8bbe9690242c0bae7a4d0cca9ef912977cc8d3adfa8814467994"}, {0x98, 0x114, 0x7fffffff, "300a654c9727f7b8f9f39eca220696fe54d42b80a67a0fc5c5cc80e75d168476a406d9f08f66e037e898ba1ea0c367ad1eb5b5204889ce7b1adfdba13b5d3f3c9cff432b69da834583de35049290ef2f4e9ca332dd376cce2759b884247ce648b8ca006be8ae6be446a343853a98e059685275c171704a111330de140530f9917208e4"}], 0x100}, 0x40040) r4 = semget$private(0x0, 0x3, 0x40) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000002300)=""/141) 05:52:22 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:22 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x6000000000000000}, 0x0) [ 2351.158667][ T1936] UBIFS error (pid: 1936): cannot open "ubi!_0x0", error -19 [ 2351.163034][ T1937] UBIFS error (pid: 1936): cannot open "ubi!_0x0", error -19 [ 2351.185326][ T1937] netlink: 'syz-executor5': attribute type 5 has an invalid length. 05:52:22 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='/bifs\x00', 0x0, 0x0) 05:52:22 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[]}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:22 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x10', 0x0, 0x0) 05:52:22 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f00000000c0)) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000000)={0x3, 0xffffffffffffff4b}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x40000}) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x400, 0x800}) setpriority(0x2, 0x0, 0x800000000000e6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000003c0), 0x0) getresgid(0x0, 0x0, &(0x7f0000000600)) 05:52:23 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x1f', 0x0, 0x0) 05:52:23 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ub%fs\x00', 0x0, 0x0) 05:52:23 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc79b000, 0x1000000}], 0x0) 05:52:23 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:23 executing program 5: r0 = socket(0x1b, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={r1, 0x4, 0x3, 0x6, 0x200, 0x1, 0x3}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) write(r0, &(0x7f00000000c0)="143460bffcb72ca0b98c63305935ad470cc1f2d3497ed6b805d1ca1fdb9d01808e315d92e4000000", 0x28) 05:52:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x6558000000000000}, 0x0) 05:52:23 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubif#\x00', 0x0, 0x0) 05:52:23 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2352.098581][ T2284] UBIFS error (pid: 2284): cannot open "ubi!_0x0", error -19 05:52:23 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:23 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubif%\x00', 0x0, 0x0) [ 2352.099336][ T3841] UBIFS error (pid: 2284): cannot open "ubi!_0x0", error -19 05:52:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000200)) r0 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) sendmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x0, 0x0, 0x2, 0x0, 0x3, "da303330bca9867b14db2503801aab7839914fc470d9c60cebad1e1dc69e2cd4681eb043c7afc3f682f78600342327ab25f48af1256a8fa5d0db12a24e7b66", 0x10}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)="4e769632434657fd9493be4da0bd38cd553b17f6f915a2edbb101baaafa09f7ba2358b8887b60d8c608cd86b118b83faaa892caf8c849312abf5e546a2b5477229", 0x41}, {&(0x7f00000003c0)="1149b2f745334b6df2e5633fba190c995b6fd165c9d2f1ecbfbe94d15e7369e8b8ddf39b2915690bde4841198486b23d1b85a6a9bc63bd588573f20e41ff2d6fdc6fd82ac19f8784128fd74fc1f277b917e423025eca127b31f3c799ee636fda14ddb6488948bb3189607d3775e7aed5b10b860f78618d4dc1", 0x79}, {&(0x7f0000000440)="3f88908de2784f1c96078b13636bab64df6f3a2d82c50fd8873129f5908af1dd3315bf5e3d031b6b0fe7e698d7ec28b891ca125bed0f1be2a293c5a478f46abba51e2060c262963209b022f5fdf613233cc66742d388", 0x56}, {&(0x7f00000004c0)="09fd8bb8b39cd38a7987c3892037aebccbd78717a131346d6c34bf17622286508e232cadc2537a23ee345b880dd124aa0f78829a4e3f4ea3657e3c8a445a15ab2e87717ec881a5631347ff34b32c8ead4801eb122a9b04906712c3debfc7db6cbb356527f8bbe2ad79f4960cc6837cd94de52b16282154fcdf6f3bc494786e77eb66020cce046d7e254954fb8d7fa757a757f3d9958412aa1e962851c9bd12e893bb1ac43801be456e7efae27a6e817a5c248ecf85c92153d150fa3513a97d9a369151f438e2f2f93ee7", 0xca}, {&(0x7f00000005c0)}, {&(0x7f0000000600)="2d0f24c38546a5cf39395052c0cab86a04472d2c5a4978400f720cd85abd9b885496b13bb35c", 0x26}, {&(0x7f0000000640)="4f54907e0c1dae1d8c47f87d11be9b7558b70643614a9cb6b61ba87f52c8a7f297370751cffaa43ec25d874cc559df9261beb03cccb22b206936cefc3db96a5fc95b53353c183c57bb73b4338f8dc43a97c183e242efa86a7b272eb795d6e07a0a4115d7a1e79fc8f3b18cb1a63e391bef9a7aec4b2867442746f1abf2656bd9", 0x80}, {&(0x7f00000006c0)="a0d92e72bf9387e05d9a4bd1ca588084768cbea2c25959e7700dbf", 0x1b}], 0x8, &(0x7f0000000800)=[{0x28, 0x117, 0x8c, "064e054564e627519e996205518644f7ac997f88"}], 0x28}, 0x4}, {{&(0x7f0000000840)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x3, 0x1, 0x3, {0xa, 0x4e23, 0x3, @local, 0x95}}}, 0x80, &(0x7f0000001d00)=[{&(0x7f00000008c0)="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", 0xfc}, {&(0x7f00000009c0)="e7bc40f9099068d72ddde9c69e86dfe49221a372dd14935d6d7dea4345755d35d8b68a25289696dc2f16783f04845a42178bea6fccec402cbf18b7a49505dc26e32ab903f49328456695fec6a88b68a7c3dba2009486dd166227de500aca07166256a645367c86f141ace383aeab520dc2afc29eb32d933313e7a045e431472a9c75d4d7571817c5a60c2c8b44c94e9ebd20c140d246fe90751efb89e7c90501dbfa5ef56166ac707947118ac507ce35a26851628fb740f6eadd0fa0caf9d7fb68852dc158e88bab123a3251d15af58815caa3a971848353d829b9aa583a3277bd0b5144296d6ee85b4310407b4ea11e78", 0xf1}, {&(0x7f0000000ac0)="3780a5c09288d588c07f50e0", 0xc}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000001b00)="aa74b0936acbdf42b048f906637cfc60469ebf882a1ba1a8c2223ad7682b65f37faa3479605385f33b0f20c4718b88c2d9b36eaf5db27cc75b98b85625", 0x3d}, {&(0x7f0000001b40)="5f63c924f5180de0d10fce91e6a25c4b6c8fecee9c6e74281b3b2ff8eac54a13a51f9179b9b6de2624725fd75abec4ffad5409db27829489f6080a410ef6bee6d915820b7fbd36b12cb77eeddd5724600bb45a2f1dccb8ff0bc61d2a2564a326dcd5562f69c4ceefc5aebc45ebf700298d97ad7f1184ef13c8e43d29058ca387f37edc0010d46bd145367e68", 0x8c}, {&(0x7f0000001c00)="3f4dcbdd55aedf34502515780c9e6b48db7f4413c0febc3cbe58ebe78d8721de859c43edd31b633486cef0c26d56f280f69ce786f133a95371e5be8176e799ddf9983029b6a6179233e766f766dbe9b2b9c9690973149f06312741bbb2cb748c46a2c70ba312e521fb2f2de851e449a6533aea828f9a2fb961d961d27b58befe3713cd0be3c12b45eeb2ef42babe89bf6a9cd240e5dc8b7d62ea3507f2299386c1c2559ba9b60727c1e7a9f83225b8065a6cccd57ce2cf4f9fc6bbafbe71893162cb6e50a6421bc63a4ab2bed00826843c18366ddb2463b838e5f81e37da8aa6bd2ca5eceb8abe04", 0xe8}], 0x7, &(0x7f0000001d80)=[{0xe0, 0x0, 0x8, "892c4071070e7b0d6951953464e4d4a69f7da0ae3d8b2fb2ef3b862ae6c5cbc491276a0ed08a5f039b0d3027310820b7f8fdbb242890bcdc2e13b17fda59580a9043bdcb9892b0f5ebf8ab2e2a86d36bfb53b8fc6aecd2a894d6021a8ed5af881b85b9f023512acb8f13733066e920743da8d0d2166a22d3b1898f8e423442c12e0b78bb3cd45e63111d0f12098f1dcf50d64ffe2f172f970c6068fba9abc46075afa16df537acf6a536bae905085c5a6a017d344085240c6f1e8f86066bf7cefbfd3bfa63d0076e69beae7a"}, {0x90, 0x13f, 0x8, "12d51b2d1690c6959246bf4ffb974a1944a4726472f0cc0425094a988bd47414f108fd249e4cdcbe1ea6a268e42903d3560a769a9141b2871bf30bc1c9681018bc1b5f107b0d7966df255db452daf4091d90465fe6359a20fbe15ddf6a1a96a8892800b05604065f4f20bccbaae9d64d02c82613db0d7206d71b1533d194"}, {0xb0, 0x11f, 0x3, "6b3b8546bf426759b30537fab9091639c9366afa5b4eb0abfce073f9e48f2a0252af5bd367152a862115dd913fff8a2d97cbb9039e06aff0160e03f929c1e4ee99a67ea63d6294dad57a068c41d5555c2f12d18ee973b36e12cf6f0a07ae5c8140d7d8e4aad529cd779ae1e11e372a90b85852b36401b4ca8f6b1661e7c06f0b0afa6a931a642a5ed1795371043eae868cd3022d31ce0fc20cea0195c7fa7609"}, {0xe0, 0x13f, 0xfff, "29ccd2fb067cc27df4fd0d8703fec25a609023c0d62ea59172477bc90d224123ef9c8db2d925b7ca9bfe6c08fc1f4516184f12b4df64b3a76d83a9f34adadfc15d1e688605d859ba71594d3f8f045b863bdf0f8b392b90ac0018f54f02511b7dfd1572535a760b70a508321e442ca1098a94753c65439a228c56d162f4de2e1e0d1fe7df80c30c52426e8390b2599b5cd8913a2283c46532c88d825b1261bcf694adb6972d7c81c0cc374463f000c07d64267f27be2644be505dd3e24f783fdd1e197e55f1606772ed"}, {0x20, 0x1, 0x0, "88f4ca7662c56d91d199e0"}, {0xd8, 0xff, 0xec3, "10eebe4628f4dffa755b7c3109bc1737d76b1d77eb7eca087f9a15ec25ab228a525770736510a82cfad34065c42a3c5d02d989ba325d5905980f3595f25bbb2238dd0d0fcc713dbb39b5d1574c8929bb6803911146b7d1ea8d6404bddc8851f34a41c899ed42c4ea60f1be907c72eafb23e169339bc525ee4bf7cca7993b0cb97a7ed57560066d58f11f8fe4a1d6f2a640282d00a20c0c23203cff6565f4f02693b52183b1aad907e46de9a7a7d7e760b5755aabc78c6cf15562131dfb5f995472f056"}, {0x50, 0x340f8d462203609f, 0x5, "c42726ea499aeabaca939eefb691b881936ffb59b455495dcf08216b2eb1c4c87c9d732c816c36e5592788a254aece1469745ea8e09dd96b27440671"}], 0x448}, 0x9b0}], 0x2, 0x24000000) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000280)={0x0, "4223582ef39b57bcbc477e2ffa256bdd6fbf089f59f607eae7d19220fb1c1972a093f46de4cfabfdd62f90826dbda3ae62ee9d6f0e54b808964c29c77b88bb75952e6357dc41769a8454488ce05d64904b102f33b876b4e05c9f0a725f93aea0400ef9964b0dc963fa6be3c30182c330ecfc91c76aa731302d7e9f89c6e0d577"}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @local}, 0x10) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x2}) 05:52:23 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x8100000000000000}, 0x0) [ 2352.342835][ T2510] UBIFS error (pid: 2510): cannot open "ubi!_0x0", error -19 05:52:23 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubif*\x00', 0x0, 0x0) [ 2352.344018][ C1] UBIFS error (pid: 2510): cannot open "ubi!_0x0", error -19 [ 2352.396207][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2352.409498][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:52:23 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc7e2000, 0x1000000}], 0x0) 05:52:23 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2352.576913][ T2667] UBIFS error (pid: 2667): cannot open "ubi!_0x0", error -19 05:52:24 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x88a8ffff00000000}, 0x0) 05:52:24 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubif+\x00', 0x0, 0x0) 05:52:24 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000100)={0x7, 0x6d, 0x6}, 0x7) socket$inet_udplite(0x2, 0x2, 0x88) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video0\x00', 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528acba}], 0x1, 0x0) 05:52:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2352.579741][ T3841] UBIFS error (pid: 2667): cannot open "ubi!_0x0", error -19 [ 2352.758478][ T2747] UBIFS error (pid: 2747): cannot open "ubi!_0x0", error -19 [ 2352.767276][ T3841] UBIFS error (pid: 2747): cannot open "ubi!_0x0", error -19 05:52:24 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2352.992814][ T2953] UBIFS error (pid: 2953): cannot open "ubi!_0x0", error -19 05:52:24 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubif-\x00', 0x0, 0x0) 05:52:24 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000180)={0x5, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @remote}]}) setns(r0, 0x2001fffd) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000001c0)={'syzkaller1\x00', 0x10000}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x5, 0x400, 0x5}) [ 2352.995514][ T3841] UBIFS error (pid: 2953): cannot open "ubi!_0x0", error -19 05:52:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xc3ffffff00000000}, 0x0) 05:52:24 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc7e3000, 0x1000000}], 0x0) 05:52:24 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:24 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubif.\x00', 0x0, 0x0) 05:52:24 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0xfffffffffffffffe, 'veth1_to_team\x00', 0x8}, 0x18) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x4800, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 05:52:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xfcffffff00000000}, 0x0) [ 2353.579986][ T3351] UBIFS error (pid: 3351): cannot open "ubi!_0x0", error -19 05:52:25 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2353.581471][ T3841] UBIFS error (pid: 3351): cannot open "ubi!_0x0", error -19 05:52:25 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubif0\x00', 0x0, 0x0) [ 2353.734497][ T3488] UBIFS error (pid: 3488): cannot open "ubi!_0x0", error -19 [ 2353.735184][ T3841] UBIFS error (pid: 3488): cannot open "ubi!_0x0", error -19 05:52:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:25 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xc0', 0x0, 0x0) 05:52:25 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xfeffffff00000000}, 0x0) 05:52:25 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x442040, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r1}) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x24b691e8, 0x101, 0xfffffffffffffff7, 0x153, 0x200, 0x5, 0x5, {0x0, @in6={{0xa, 0x4e23, 0x6, @ipv4={[], [], @broadcast}, 0x7}}, 0x0, 0x8, 0x80000000, 0x1}}, &(0x7f00000001c0)=0xb0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={0x0, 0x82}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000003c0)=ANY=[@ANYRES32=r2, @ANYBLOB="40fcffffcff0b37e6394937e438e9d8839b3cd601147a4dfb1d25544bd8bb7e66e97acf2df5364b17e8b93f5c1a01a9090dae69281a2f5de97bec3c17287077c31f568b4ba6573b8d0d8d485c1675b1ade376fcc3e97a0f1543e70ae5660cc2547be"], &(0x7f0000000380)=0x5d) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r3, 0x1f, 0x3}, 0xc) 05:52:25 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xc7e9000, 0x1000000}], 0x0) 05:52:25 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifX\x00', 0x0, 0x0) 05:52:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:25 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, 0x10000, 0xffffffffffffb939, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) accept4(r0, &(0x7f0000000040)=@nfc_llcp, &(0x7f00000000c0)=0x80, 0x800) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0}, 0x2c) 05:52:25 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xff00000000000000}, 0x0) [ 2354.420169][ T3802] UBIFS error (pid: 3802): cannot open "ubi!_0x0", error -19 05:52:25 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifc\x00', 0x0, 0x0) 05:52:25 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) [ 2354.421024][ T3841] UBIFS error (pid: 3802): cannot open "ubi!_0x0", error -19 05:52:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:26 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 05:52:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x311000, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x6000000, 0x10080) r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x100000000, 0x880) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7ff) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0xc000000) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup3(r2, r1, 0x0) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000040), 0x4) 05:52:26 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifd\x00', 0x0, 0x0) 05:52:26 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xca70000, 0x1000000}], 0x0) 05:52:26 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:26 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifi\x00', 0x0, 0x0) 05:52:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:26 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x3b3, 0x20000, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20002, 0x0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000040)={0x4, 0x3, 0x2}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/rt_acct\x00\x02\x0f_j$T\x96\xe5\xfeo\xa1\x89\xe3\x91K\xb4\x86Q_Q\x9bH\x88\a\xa0Z\xc2*\x83t\xa3\xd4\xccr3@y_m\xcb-\xd9\xa0\xdf\x02w8!\x00JX\xb8S\xc6\x97\xa2\xf5.|\xa0\xd7Q42\xce\xa7w\xdeO\x1a~\x91`S\x92\xabo') preadv(r2, &(0x7f00000017c0), 0x10000000000001f7, 0x0) 05:52:26 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 2355.060553][ T4244] UBIFS error (pid: 4244): cannot open "ubi!_0x0", error -19 [ 2355.061348][ T4248] UBIFS error (pid: 4244): cannot open "ubi!_0x0", error -19 [ 2355.079717][ T4248] Unknown ioctl 1076647481 05:52:26 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:26 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifl\x00', 0x0, 0x0) 05:52:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x121a00, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) r2 = socket(0x10, 0x3, 0xa) r3 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') sendfile(r2, r3, 0x0, 0x100000001) [ 2355.277336][ T4455] UBIFS error (pid: 4455): cannot open "ubi!_0x0", error -19 [ 2355.278019][ T3841] UBIFS error (pid: 4455): cannot open "ubi!_0x0", error -19 05:52:26 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:26 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x2}, 0x0) 05:52:26 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xcb25000, 0x1000000}], 0x0) 05:52:26 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifo\x00', 0x0, 0x0) 05:52:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2355.515228][ T4492] UBIFS error (pid: 4492): cannot open "ubi!_0x0", error -19 05:52:27 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:27 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifp\x00', 0x0, 0x0) [ 2355.535637][ T3841] UBIFS error (pid: 4492): cannot open "ubi!_0x0", error -19 05:52:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x3}, 0x0) [ 2355.745523][ T4583] UBIFS error (pid: 4583): cannot open "ubi!_0x0", error -19 05:52:27 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:27 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:27 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifu\x00', 0x0, 0x0) [ 2355.751005][ T3841] UBIFS error (pid: 4583): cannot open "ubi!_0x0", error -19 [ 2355.991775][ T4729] UBIFS error (pid: 4729): cannot open "ubi!_0x0", error -19 05:52:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0xfffffffffffffd60) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') ioprio_get$uid(0x3, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000300)=0x712, 0xfffffffffffffd50) pivot_root(0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000040)=0xfffffffffffff000) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000003c0)) getegid() ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000180)={0x0, 0x1}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000000)={0x6}) ioctl$FICLONE(r0, 0x40049409, r0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x8000, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c6d6d61702c76657273696f6e3d3970323030302c7365636c6162656c2c7375626a5f726f6c653d862c00"]) mount(0x0, 0x0, &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)='P\xf0selinuxcgroup\x00') r2 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000740)={0x2, 0x7, 0x5, 0x5, 0x8, 0x1f}) ptrace$poke(0xffffffffffffffff, r2, 0x0, 0x3) fsetxattr$security_capability(r1, &(0x7f0000000200)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0x9}]}, 0xc, 0x0) syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x201b}) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000600)=""/110) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000680)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)=r4, 0x4) preadv(r3, &(0x7f0000000100)=[{&(0x7f00000012c0)=""/217, 0x4}], 0x1, 0x0) 05:52:27 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2355.995417][ T3841] UBIFS error (pid: 4729): cannot open "ubi!_0x0", error -19 [ 2356.188324][ T4808] UBIFS error (pid: 4808): cannot open "ubi!_0x0", error -19 05:52:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 2356.190345][ T4807] UBIFS error (pid: 4808): cannot open "ubi!_0x0", error -19 [ 2356.252340][ T4807] EXT4-fs warning (device sda1): ext4_resize_fs:1917: can't read last block, resize aborted 05:52:27 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:27 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifx\x00', 0x0, 0x0) 05:52:27 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xcbe2000, 0x1000000}], 0x0) 05:52:27 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'trusted.', '/proc/thread-self/attr/current\x00'}, 0x0, 0x0, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000240)=""/232) write$apparmor_current(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030300400303030303030345e2f70726f632f7468726561642d73656c662f617474722f63757272656e74002265726d70726f66696c6520737461636b202f70726f632f7468726561642d73656c662f617474722f63757272656e7400"], 0x1) 05:52:28 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x6}, 0x0) [ 2356.543848][ T5117] UBIFS error (pid: 5117): cannot open "ubi!_0x0", error -19 [ 2356.545050][ C1] UBIFS error (pid: 5117): cannot open "ubi!_0x0", error -19 [ 2356.554154][ C1] net_ratelimit: 20 callbacks suppressed [ 2356.554162][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2356.573971][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:52:28 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:28 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x02', 0x0, 0x0) 05:52:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2356.794058][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2356.799914][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2356.801770][ T5315] UBIFS error (pid: 5315): cannot open "ubi!_0x0", error -19 [ 2356.805250][ C0] UBIFS error (pid: 5315): cannot open "ubi!_0x0", error -19 [ 2356.805789][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2356.826313][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2356.832209][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2356.838037][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:28 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b91c2) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2042, 0x0) mmap(&(0x7f0000000000/0x237000)=nil, 0x237000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 05:52:28 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8}, 0x0) [ 2356.957129][ T5344] UBIFS error (pid: 5344): cannot open "ubi!_0x0", error -19 05:52:28 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x03', 0x0, 0x0) [ 2356.957782][ T3841] UBIFS error (pid: 5344): cannot open "ubi!_0x0", error -19 05:52:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:28 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xce88000, 0x1000000}], 0x0) 05:52:28 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:28 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x04', 0x0, 0x0) 05:52:28 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xa}, 0x0) 05:52:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2357.384615][ T5563] UBIFS error (pid: 5563): cannot open "ubi!_0x0", error -19 05:52:28 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2357.385327][ T3841] UBIFS error (pid: 5563): cannot open "ubi!_0x0", error -19 05:52:28 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x05', 0x0, 0x0) [ 2357.579560][ T5677] UBIFS error (pid: 5677): cannot open "ubi!_0x0", error -19 [ 2357.580202][ T3841] UBIFS error (pid: 5677): cannot open "ubi!_0x0", error -19 05:52:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xc}, 0x0) 05:52:29 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000002c0)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x80101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)='./file0\x00') write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="2a00000000000000000500000000000000000002000000000000000000"], 0x1d) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="ff019105ab1072c24e2b98df1388f1ad01000100000000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="ab87850a31da9498781d743087a720f23201da19292baba86084635fbe009d2c015028"], &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="f981fb359c4c38df75032ec521940d6c0aa6a77144673467db08da5f54ff32ea0361a10706df"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x7ffff, &(0x7f000002f000)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) close(0xffffffffffffffff) 05:52:29 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:29 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x06', 0x0, 0x0) [ 2357.909959][ T5762] UBIFS error (pid: 5762): cannot open "ubi!_0x0", error -19 [ 2357.924130][ T3841] UBIFS error (pid: 5762): cannot open "ubi!_0x0", error -19 05:52:29 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xcefe000, 0x1000000}], 0x0) 05:52:29 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:29 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\a', 0x0, 0x0) 05:52:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xe}, 0x0) [ 2358.184998][ T5874] UBIFS error (pid: 5874): cannot open "ubi!_0x0", error -19 05:52:29 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2358.192841][ T3841] UBIFS error (pid: 5874): cannot open "ubi!_0x0", error -19 05:52:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:29 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\f', 0x0, 0x0) [ 2358.362669][ T5980] UBIFS error (pid: 5980): cannot open "ubi!_0x0", error -19 [ 2358.363718][ T3841] UBIFS error (pid: 5980): cannot open "ubi!_0x0", error -19 05:52:29 executing program 5: mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='sockfs\x00', 0x8, &(0x7f0000000240)='/dev/full\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, &(0x7f0000000180)) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x1d) mount(0x0, &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='configfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x4a9e280) listen(0xffffffffffffffff, 0x0) 05:52:29 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:30 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x12', 0x0, 0x0) 05:52:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xf}, 0x0) [ 2358.617218][ T6033] UBIFS error (pid: 6033): cannot open "ubi!_0x0", error -19 [ 2358.621441][ T3841] UBIFS error (pid: 6033): cannot open "ubi!_0x0", error -19 [ 2358.633118][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2358.642878][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:52:30 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xcfbe000, 0x1000000}], 0x0) 05:52:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:30 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x18', 0x0, 0x0) 05:52:30 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2358.895618][ T6182] UBIFS error (pid: 6182): cannot open "ubi!_0x0", error -19 05:52:30 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2358.896317][ T3841] UBIFS error (pid: 6182): cannot open "ubi!_0x0", error -19 05:52:30 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x1e', 0x0, 0x0) 05:52:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:30 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000002c0)=0x9, 0x4) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000400)={0xff, 0x0, 0x3}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000440)=0x4) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000140), 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141046, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380)={0x3f, 0xc60, 0x202, 0xfffffffffffffffe, 0x200, 0x8, 0x0, 0x5}, 0x20) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000040)={0x6, "dcdefc722477e99998ba8fecf2908dbf9f985b343771abccd595a0969648d23f", 0x20, 0x6818, 0x4, 0x0, 0x2}) add_key$user(&(0x7f0000000240)='user\x00', 0x0, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000300)=0x6, &(0x7f0000000340)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000280)={0x9, 0xfffffffffffffff8, 0x1ff, 0x4, 0x25f}) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x7f) keyctl$get_security(0x11, 0x0, 0x0, 0xffffffffffffff89) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000640)=ANY=[@ANYBLOB="c952dae65301720f51159cc1f61ae1013188476e2416ee4184d851a56d3c24c11d1b9043d8d460a765daf08528ccd5d54bf912ed5b9526327d395624dbce58d5746d7d6f43a21189981ba57b29a59ad8ab2b13bb3827eeda282b8bba1c125d7b650b46b27ebae5833c4cb0b0a1b3f5b07023377bc3de2e1902b4a4ff6e2b6701b300096184adda143f1c8c873ed1767d36dbecd6b84cfa50fa8b6d8e189ebf3a8f793e66c6490c214fd003f71514880bbb563e03f8bd49e0e670ffb2142e056c534837749e187d1de36cfb872e52701625e7392c2e6682"]) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000100)) close(r2) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0), &(0x7f0000000480)=0xffffffffffffff64) [ 2359.226820][ T6262] UBIFS error (pid: 6262): cannot open "ubi!_0x0", error -19 05:52:30 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2359.230054][ T3841] UBIFS error (pid: 6262): cannot open "ubi!_0x0", error -19 05:52:30 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs$', 0x0, 0x0) [ 2359.466610][ T6375] UBIFS error (pid: 6375): cannot open "ubi!_0x0", error -19 05:52:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380), 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2359.473142][ T3841] UBIFS error (pid: 6375): cannot open "ubi!_0x0", error -19 05:52:31 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xd1b2000, 0x1000000}], 0x0) 05:52:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x60}, 0x0) 05:52:31 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) 05:52:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x3, 0xfff, 0x8, 0x3}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x290201, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000200)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x2) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762ff224888a"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 05:52:31 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs*', 0x0, 0x0) 05:52:31 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380), 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2359.864395][ T6492] ceph: device name is missing path (no : separator in /dev/ò$ˆŠ) 05:52:31 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:31 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs0', 0x0, 0x0) 05:52:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x300}, 0x0) [ 2360.017459][ T6673] UBIFS error (pid: 6673): cannot open "ubi!_0x0", error -19 [ 2360.019566][ T3841] UBIFS error (pid: 6673): cannot open "ubi!_0x0", error -19 05:52:31 executing program 5: link(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f000025c000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) read(r3, &(0x7f00000000c0)=""/91, 0x5b) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000040)={0xd00000000000000, 0x800000000000000, 0x80850000}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="165dcfffa8d9eca2d68954d2d2733e6afc13caae0f8bb3794788f0a5adc3a745a7fd7f5c9e6ee8f5ff9b1a24225db58318b5f9785c41064c9b7b61602a5e06"], 0x3f) fstat(0xffffffffffffffff, &(0x7f0000000480)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000500)=0xc) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000000), 0x4) 05:52:31 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380), 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:31 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) 05:52:31 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) 05:52:31 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xd1b3000, 0x1000000}], 0x0) 05:52:31 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(0x0, 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40001, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x280020}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="80000000", @ANYRES16=r4, @ANYBLOB="08022cbd7000fbdbdf250400000024000100080005000100000008000800000000f0070004004e230000080006006e71000024000200080009000000008008000400123f00000800060000000000080003000200327b6fbd00001c000300080007004e2300000800040000000000080003000200000008000400e6091d9ef0c915568a7f2e59e002d583b329726a6407c04a80b467779ffd794141dc5bc40c8f50d5d01fa0ced1094db91d2a2440e0de6012060f"], 0x80}, 0x1, 0x0, 0x0, 0x20000040}, 0x4) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) fcntl$getownex(r3, 0x10, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000600)={{0x4, 0x3, 0x8, 0x6b85, '\x00', 0x4}, 0x5, 0x2000003b, 0x3, r5, 0x5, 0x2, 'syz0\x00', &(0x7f0000000580)=['IPVS\x00', '/dev/infiniband/rdma_cm\x00', '[md5sum#keyringppp0}.selinuxwlan1\x00', '\'^\x00', 'GPLD%-em0\\+\'mime_type\x00'], 0x58, [], [0x76, 0x1, 0xf938, 0x7fffffff]}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:52:31 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs6', 0x0, 0x0) 05:52:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x600}, 0x0) 05:52:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(0x0, 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:32 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) 05:52:32 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs<', 0x0, 0x0) 05:52:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x2, 0x3ff, 0x4, 0x1}, 0x8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) prctl$PR_CAPBSET_DROP(0x18, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f1) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 05:52:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(0x0, 0x110000141042, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:32 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xd1cb000, 0x1000000}], 0x0) 05:52:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 05:52:32 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifsH', 0x0, 0x0) 05:52:32 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2361.139216][ T7235] UBIFS error (pid: 7235): cannot open "ubi!_0x0", error -19 05:52:32 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xf9', 0x0, 0x0) 05:52:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:32 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifsL', 0x0, 0x0) 05:52:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x40) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40100, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000018c0)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0x4b7) r6 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000740)=0x0) fcntl$getownex(r0, 0x10, &(0x7f00000008c0)={0x0, 0x0}) getresuid(&(0x7f0000000900)=0x0, &(0x7f0000000940), &(0x7f0000000980)) fstat(r3, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000a40)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0}, &(0x7f0000000ac0)=0xc) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getpid() getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)=0x0) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000d40)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000e40)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000e80)={0x0, 0x0, 0x0}, &(0x7f0000000ec0)=0xc) r20 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000f00)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000001000)=0xe8) r22 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001080)={0xffffffffffffffff, r2, 0x0, 0x27, &(0x7f0000001040)='selinuxeth0{nodev/,ð1usermime_type\'\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@initdev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000011c0)=0xe8) fstat(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001280)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000001380)=0xe8) r28 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001400)={0xffffffffffffffff, r2, 0x0, 0x11, &(0x7f00000013c0)='/dev/dlm-control\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001440)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000001540)=0xe8) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r3, &(0x7f0000001780)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000840)=[{&(0x7f0000000240)={0x94, 0x35, 0x2, 0x70bd25, 0x25dfdbfd, "", [@typed={0x14, 0x83, @ipv6=@dev={0xfe, 0x80, [], 0x1f}}, @nested={0xc, 0x77, [@typed={0x8, 0x86, @uid=r4}]}, @generic="8ca8c9944f9883096ad37b868f0623f56167c4fb4cea303d53aace4151922f475303864d0668b5d03ea427841bfcd464865885d93563a77d864b39bbb30b5ca9e7c59242b2a0b46ea9d49b15a8fbe3c9d53b135617cd3b0596551b3cf01232f9f248"]}, 0x94}, {&(0x7f0000000440)={0xbc, 0x16, 0x200, 0x70bd26, 0x25dfdbff, "", [@typed={0xc, 0x7e, @u64=0x7f}, @nested={0x8c, 0x36, [@generic="f6d390574ef339fff1dde3b7d299b5", @typed={0x14, 0x30, @ipv6=@remote}, @generic="d036ff902e68c97857ff9db319480a81f2ec2c81699b41069bddef6bf74ab5bed59828a54375bc88e199ef00e76839b83b39f81b9b6edb5a0f6fd9fb2aa05fe2c978122652484718c27e22b58b6606404810ac51038f1eccddc4", @typed={0x8, 0x95, @uid=r5}]}, @typed={0x4, 0x37}, @typed={0x8, 0x49, @pid=r6}, @typed={0x8, 0x7a, @u32=0x6}]}, 0xbc}, {&(0x7f0000000500)={0x94, 0x38, 0x1, 0x70bd2d, 0x25dfdbfc, "", [@generic="dda26f93b3c9ae7203856fc0c2f3821be10bc341c8e9c4d1e707b83790711c2b1976a76437e0a1dad7dfe172eab190d15b26d153ff8e774cb14d2ff129c59bdf9638be62a9d23e3a92de838ca98645c5b371aa8060cb93c202cb1c2ac32aad5c2e498c4ee784b1b3602452f1a0db9e76ca069e946f2a71c104581b092f50d0a2593f0b"]}, 0x94}, {&(0x7f00000005c0)={0x160, 0x1a, 0x124, 0x70bd2c, 0x2, "", [@nested={0x150, 0x80, [@generic="ef6af5fbcda82a347c777bc49a28d7e9a667f6b5b60bfb6ff68b12d608da6b4c49801238cd8e96526b7463b4ba6f26aca7611edc0e40237e6127ebfa4229862b91da93003ff5cde83c764a698838948dcd964417291554324642d376df541c469717cec583d68adef599f8562a996757fcfd7bf4207acfcd4b794212d19ac34b427adfdb84a4ad1af5c9017ecbd7f27bed90efa1a946a49589cd530496a1e71167987c5bfa744f3b330716b30f94f2a4b20dc8aab3480ab0229495a847c2ba970c60d2cca2fc173f923e6ac2ad6c9e96f6e3626370b2e13bd2", @typed={0xc, 0x3, @u64=0x8000}, @generic="4d9d8c77c4bcc1559201a88a0a7ab8ace8e614b27b5b5b7ba89986bb31d812ea2998ea3e61d004e5fcb51063edb8b074df3697b344b5d7cfb1e0ac5b51bf0425fd5a23b2640cfe34ed59f59d93b4840f05bdff4579", @generic="a84457cd39729f3cb54c33c9bd75fccb83"]}]}, 0x160}, {&(0x7f0000000780)={0x98, 0x35, 0x3, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x94, @pid=r7}, @generic="ad38622e28af164f3c95df48051d28187421fdbfaed5476e7189bda2d806996397f6d7e238117ac43146ef5f80e410fe268932941a58346c9bd19991ba00424193b0c1c1be6a1fcfec02ada481de892943ce3c1dd33df195845bae15bde2d2659876a89c26d1f6dd", @typed={0x18, 0x29, @str='/dev/dlm-control\x00'}]}, 0x98}], 0x5, &(0x7f0000001640)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x20, 0x1, 0x1, [r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @rights={0x20, 0x1, 0x1, [r2, r2, r1]}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @cred={0x20, 0x1, 0x2, r26, r27, r28}, @cred={0x20, 0x1, 0x2, r29, r30, r31}], 0x140, 0x8000}, 0x4004000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x400, @mcast2, 0x44}, @in6={0xa, 0x4e23, 0x0, @remote, 0x1f}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x26}, 0x4}, @in6={0xa, 0x4e21, 0x100, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}], 0x80) r32 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCDELRT(r32, 0x890b, 0x0) 05:52:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xc00}, 0x0) [ 2361.145411][ T3841] UBIFS error (pid: 7235): cannot open "ubi!_0x0", error -19 05:52:32 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xd309000, 0x1000000}], 0x0) 05:52:32 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifsh', 0x0, 0x0) 05:52:32 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x8c', 0x0, 0x0) 05:52:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x160) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 05:52:33 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x1) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x15f, 0x5, 0x0, 'queue0\x00', 0x81}) ftruncate(r0, 0x800) 05:52:33 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifsl', 0x0, 0x0) 05:52:33 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xd30c000, 0x1000000}], 0x0) 05:52:33 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xf6', 0x0, 0x0) 05:52:33 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:33 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifst', 0x0, 0x0) 05:52:33 executing program 5: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6003, 0x0) eventfd(0x101) r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000180)=0xfff, 0x4) fdatasync(r0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r1, &(0x7f0000000100)=0x4) 05:52:33 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xfe', 0x0, 0x0) 05:52:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 05:52:33 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:33 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifsz', 0x0, 0x0) 05:52:33 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:33 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x4, 0x400000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x3, 0x6, [0x3, 0x400, 0x1, 0x0, 0x5, 0x8]}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={r1, 0x101}, &(0x7f0000000540)=0x8) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2201001, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) unlink(&(0x7f0000000180)='./file0/file0\x00') r2 = socket$caif_seqpacket(0x25, 0x5, 0x3) getpeername(r2, &(0x7f00000006c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000580)=0xac) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x5890, 0x0) modify_ldt$read(0x0, &(0x7f0000000440)=""/234, 0xea) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0xde}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={r3, 0x80000, r0}) 05:52:33 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2362.454947][ T8007] UBIFS error (pid: 8007): cannot open "ubi!_0x0", error -19 [ 2362.458739][ T3841] UBIFS error (pid: 8007): cannot open "ubi!_0x0", error -19 05:52:34 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xd30d000, 0x1000000}], 0x0) 05:52:34 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 05:52:34 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xf0', 0x0, 0x0) 05:52:34 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) 05:52:34 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25905f7ca27b1f979b9a27f104eb1b4392c61fb8b3c8fe616d736634dcaa56681adaec905bc5b11352706162f1b09a328c"], 0x374) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2362.791005][ C1] net_ratelimit: 16 callbacks suppressed [ 2362.791015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2362.802617][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:52:34 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000080)='md5sum\'GPLsystem.,]@GPLppp0&^\xc6nodev#\x00', 0x25, 0x2) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='\x00', 0x6000, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x105000, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000200)) linkat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f00000001c0)='./file0/bus\x00', 0x1400) r3 = creat(&(0x7f0000c5eff4)='./file0/bus\x00', 0x0) mq_notify(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) r4 = dup3(r0, r0, 0x10000000000) eventfd(0x17) fanotify_init(0x0, 0x1000) flistxattr(r0, &(0x7f0000000580)=""/212, 0xfffffffffffffe9b) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) 05:52:34 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:34 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 2362.961318][ T8241] UBIFS error (pid: 8241): cannot open "ubi!_0x0", error -19 05:52:34 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2362.961956][ T8244] UBIFS error (pid: 8241): cannot open "ubi!_0x0", error -19 [ 2363.022192][ T8244] UBIFS error (pid: 8244): cannot open "ubi!_0x0", error -19 05:52:34 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:34 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2363.048216][ T3841] UBIFS error (pid: 8244): cannot open "ubi!_0x0", error -19 [ 2363.190911][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2363.196725][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2363.270804][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2363.276753][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2363.282635][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2363.288941][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2363.311047][ T8462] UBIFS error (pid: 8459): cannot open "ubi!_0x0", error -19 [ 2363.312541][ T8459] UBIFS error (pid: 8462): cannot open "ubi!_0x0", error -19 [ 2363.314266][ T8462] UBIFS error (pid: 8459): cannot open "ubi!_0x0", error -19 [ 2363.330558][ T3841] UBIFS error (pid: 8462): cannot open "ubi!_0x0", error -19 05:52:34 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xd3ff000, 0x1000000}], 0x0) 05:52:34 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="200000000000000000006da4", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 05:52:34 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:34 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x5865}, 0x0) 05:52:34 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2363.478949][ T8468] UBIFS error (pid: 8468): cannot open "ubi!_0x0", error -19 [ 2363.479575][ T3841] UBIFS error (pid: 8468): cannot open "ubi!_0x0", error -19 05:52:34 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2363.510978][ T8475] UBIFS error (pid: 8475): cannot open "ubi!_0x0", error -19 05:52:35 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2363.535171][ T3841] UBIFS error (pid: 8475): cannot open "ubi!_0x0", error -19 [ 2363.625197][ T8575] UBIFS error (pid: 8575): cannot open "ubi!_0x0", error -19 [ 2363.627548][ T3841] UBIFS error (pid: 8575): cannot open "ubi!_0x0", error -19 05:52:35 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:35 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2363.726666][ T3841] UBIFS error (pid: 8650): cannot open "ubi!_0x0", error -19 [ 2363.753625][ T3841] UBIFS error (pid: 8650): cannot open "ubi!_0x0", error -19 [ 2363.805181][ T8689] UBIFS error (pid: 8689): cannot open "ubi!_0x0", error -19 05:52:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0xc0a85322, &(0x7f0000000080)={0xbf00, 0x0, 0x0, 'queue0\x00'}) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) r2 = socket(0x18, 0x0, 0x8000000000002) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x1c, &(0x7f0000000000), 0x20a154cc) 05:52:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2363.807475][ T3841] UBIFS error (pid: 8689): cannot open "ubi!_0x0", error -19 05:52:35 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs&', 0x0, 0x0) 05:52:35 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:35 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xe0e3000, 0x1000000}], 0x0) 05:52:35 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[], 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:35 executing program 5: ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, 0x0) rt_sigprocmask(0x0, &(0x7f0000072ff8)={0x7fffffff}, 0x0, 0x8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) open(0x0, 0xa800, 0xe6) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) r2 = getpid() mq_notify(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x2a, 0x0, @tid=r2}) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x1, "a19babd1a8a19148"}) writev(r1, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r1, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='htcp\x00', 0x5) sendto$inet(r1, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_setup(0x2, &(0x7f0000000100)=0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f00000000c0)=0xfffffffffffff801, 0x3) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x3, 0x4) io_submit(r4, 0x1, &(0x7f0000000400)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000040)='n', 0x1}]) 05:52:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2364.233793][ T8811] UBIFS error (pid: 8811): cannot open "ubi!_0x0", error -19 05:52:35 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs ', 0x0, 0x0) 05:52:35 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2364.260370][ T3841] UBIFS error (pid: 8811): cannot open "ubi!_0x0", error -19 05:52:35 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[], 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:35 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(0xffffffffffffffff) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) r1 = creat(&(0x7f0000000580)='./file0\x00', 0xf37c45f04d91fcae) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000002c0)={0x3, {0x0, 0x3e, 0x0, 0x0, 0x10001, 0x20}}) connect$inet(r2, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000300)=0x8001) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x1b8abab, {0x2, 0xfffffffffffffffe, @loopback}, {0x2, 0xfffffffffffffffd, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x2, 0x4e24, @broadcast}, 0x185, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) sendmmsg(r4, &(0x7f0000007fc0), 0x0, 0x4000000) umount2(&(0x7f0000000540)='./file0\x00', 0x3) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000580)={0x6c, {{0x2, 0x4e22, @remote}}}, 0x88) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = memfd_create(&(0x7f00000002c0)='\xbc\xf6', 0x0) write(r6, &(0x7f0000000300)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@mcast2}, 0xfcc0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)=0x0) ptrace(0xffffffffffffffff, r7) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0xffffffffffffff4d}}, 0x0) memfd_create(&(0x7f0000000200)='threaded\x00', 0x4) sendmmsg(r3, &(0x7f0000000180), 0x0, 0x1000000) [ 2364.432906][ T9007] UBIFS error (pid: 9007): cannot open "ubi!_0x0", error -19 [ 2364.433573][ T3841] UBIFS error (pid: 9007): cannot open "ubi!_0x0", error -19 05:52:35 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8100}, 0x0) 05:52:36 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:36 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xe2ea000, 0x1000000}], 0x0) [ 2364.615656][ T9039] UBIFS error (pid: 9039): cannot open "ubi!_0x0", error -19 [ 2364.625262][ T3841] UBIFS error (pid: 9039): cannot open "ubi!_0x0", error -19 05:52:36 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[], 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:36 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2364.754405][ T9155] UBIFS error (pid: 9155): cannot open "ubi!_0x0", error -19 05:52:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xff00}, 0x0) [ 2364.763775][ T3841] UBIFS error (pid: 9155): cannot open "ubi!_0x0", error -19 05:52:36 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:36 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(0xffffffffffffffff) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) r1 = creat(&(0x7f0000000580)='./file0\x00', 0xf37c45f04d91fcae) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000002c0)={0x3, {0x0, 0x3e, 0x0, 0x0, 0x10001, 0x20}}) connect$inet(r2, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000300)=0x8001) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x1b8abab, {0x2, 0xfffffffffffffffe, @loopback}, {0x2, 0xfffffffffffffffd, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x2, 0x4e24, @broadcast}, 0x185, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) sendmmsg(r4, &(0x7f0000007fc0), 0x0, 0x4000000) umount2(&(0x7f0000000540)='./file0\x00', 0x3) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000580)={0x6c, {{0x2, 0x4e22, @remote}}}, 0x88) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = memfd_create(&(0x7f00000002c0)='\xbc\xf6', 0x0) write(r6, &(0x7f0000000300)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@mcast2}, 0xfcc0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)=0x0) ptrace(0xffffffffffffffff, r7) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0xffffffffffffff4d}}, 0x0) memfd_create(&(0x7f0000000200)='threaded\x00', 0x4) sendmmsg(r3, &(0x7f0000000180), 0x0, 0x1000000) [ 2364.885346][ T9254] UBIFS error (pid: 9254): cannot open "ubi!_0x0", error -19 [ 2364.886048][ T3841] UBIFS error (pid: 9254): cannot open "ubi!_0x0", error -19 [ 2364.959398][ T9259] UBIFS error (pid: 9259): cannot open "ubi!_0x0", error -19 05:52:36 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:36 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2364.967937][ T3841] UBIFS error (pid: 9259): cannot open "ubi!_0x0", error -19 05:52:36 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2365.080437][ T9337] UBIFS error (pid: 9337): cannot open "ubi!_0x0", error -19 [ 2365.082686][ C0] UBIFS error (pid: 9337): cannot open "ubi!_0x0", error -19 [ 2365.109857][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2365.123063][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:36 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xe3f6000, 0x1000000}], 0x0) 05:52:36 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2365.161465][ T9371] UBIFS error (pid: 9371): cannot open "ubi!_0x0", error -19 05:52:36 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2365.162128][ T3841] UBIFS error (pid: 9371): cannot open "ubi!_0x0", error -19 [ 2365.266259][ T9375] UBIFS error (pid: 9375): cannot open "ubi!_0x0", error -19 05:52:36 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(0xffffffffffffffff) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) r1 = creat(&(0x7f0000000580)='./file0\x00', 0xf37c45f04d91fcae) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000002c0)={0x3, {0x0, 0x3e, 0x0, 0x0, 0x10001, 0x20}}) connect$inet(r2, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000300)=0x8001) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x1b8abab, {0x2, 0xfffffffffffffffe, @loopback}, {0x2, 0xfffffffffffffffd, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x2, 0x4e24, @broadcast}, 0x185, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) sendmmsg(r4, &(0x7f0000007fc0), 0x0, 0x4000000) umount2(&(0x7f0000000540)='./file0\x00', 0x3) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000580)={0x6c, {{0x2, 0x4e22, @remote}}}, 0x88) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = memfd_create(&(0x7f00000002c0)='\xbc\xf6', 0x0) write(r6, &(0x7f0000000300)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@mcast2}, 0xfcc0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)=0x0) ptrace(0xffffffffffffffff, r7) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0xffffffffffffff4d}}, 0x0) memfd_create(&(0x7f0000000200)='threaded\x00', 0x4) sendmmsg(r3, &(0x7f0000000180), 0x0, 0x1000000) 05:52:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 2365.268342][ T3841] UBIFS error (pid: 9375): cannot open "ubi!_0x0", error -19 05:52:36 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2365.386589][ T9387] UBIFS error (pid: 9387): cannot open "ubi!_0x0", error -19 [ 2365.387294][ T3841] UBIFS error (pid: 9387): cannot open "ubi!_0x0", error -19 05:52:36 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:36 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2365.511506][ T9483] UBIFS error (pid: 9483): cannot open "ubi!_0x0", error -19 [ 2365.512162][ T3841] UBIFS error (pid: 9483): cannot open "ubi!_0x0", error -19 05:52:36 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x119d6000, 0x1000000}], 0x0) [ 2365.564270][ T9494] UBIFS error (pid: 9494): cannot open "ubi!_0x0", error -19 [ 2365.570333][ T3841] UBIFS error (pid: 9494): cannot open "ubi!_0x0", error -19 05:52:37 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x10', 0x0, 0x0) 05:52:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 05:52:37 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYBLOB="814e00000900b3032ebce6ecd4015553d13c1c8dce9fbe50e898458948ec0a24ce7a8e898eb3c40d3474a33af007ff058a8604a35d44cd1bd6"]) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0af51f023c123f3188a070") r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000340)={0x7b, 0x0, [0x0, 0x0, 0x4000009f]}) 05:52:37 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:37 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2365.818494][ T9534] UBIFS error (pid: 9534): cannot open "ubi!_0x0", error -19 05:52:37 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:37 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2365.820519][ T3841] UBIFS error (pid: 9534): cannot open "ubi!_0x0", error -19 05:52:37 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x11a70000, 0x1000000}], 0x0) 05:52:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 05:52:37 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc8214"], 0x61) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @local, 0x2}, 0x325) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) [ 2366.003046][ T9724] UBIFS error (pid: 9724): cannot open "ubi!_0x0", error -19 [ 2366.019949][ T9725] UBIFS error (pid: 9724): cannot open "ubi!_0x0", error -19 [ 2366.030098][ T3841] UBIFS error (pid: 9725): cannot open "ubi!_0x0", error -19 05:52:37 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\r', 0x0, 0x0) 05:52:37 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2366.105171][ T3841] UBIFS error (pid: 9725): cannot open "ubi!_0x0", error -19 05:52:37 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x4800, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000380)=""/101, &(0x7f0000000400)=0x65) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x10000, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={0x0, 0xffffffffffffff4e}}, 0x8014) r2 = creat(0x0, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000300)) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r4) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xb, 0x0, &(0x7f0000000500)) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000240)=r4) socket$inet6_sctp(0xa, 0x5, 0x84) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f0000000140)={0x2, 0xf000, 0x1ed7, 0x10001}) connect$inet6(r4, &(0x7f0000000440)={0xa, 0x4e20, 0x2, @mcast2, 0x2}, 0x1c) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000200)=0x3) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @local}, '\x00\x00\x00\x00\x01\x00\x00\x01\x00'}) [ 2366.278214][ T9936] UBIFS error (pid: 9936): cannot open "ubi!_0x0", error -19 05:52:37 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc8214"], 0x61) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:37 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 2366.296257][ T3841] UBIFS error (pid: 9936): cannot open "ubi!_0x0", error -19 05:52:37 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:37 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x11aec000, 0x1000000}], 0x0) [ 2366.491252][T10010] UBIFS error (pid: 10010): cannot open "ubi!_0x0", error -19 [ 2366.497050][T10085] UBIFS error (pid: 10010): cannot open "ubi!_0x0", error -19 05:52:38 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x4800, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000380)=""/101, &(0x7f0000000400)=0x65) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x10000, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={0x0, 0xffffffffffffff4e}}, 0x8014) r2 = creat(0x0, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000300)) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r4) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xb, 0x0, &(0x7f0000000500)) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000240)=r4) socket$inet6_sctp(0xa, 0x5, 0x84) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f0000000140)={0x2, 0xf000, 0x1ed7, 0x10001}) connect$inet6(r4, &(0x7f0000000440)={0xa, 0x4e20, 0x2, @mcast2, 0x2}, 0x1c) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000200)=0x3) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @local}, '\x00\x00\x00\x00\x01\x00\x00\x01\x00'}) 05:52:38 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2366.533781][T10085] UBIFS error (pid: 10085): cannot open "ubi!_0x0", error -19 [ 2366.601543][ T3841] UBIFS error (pid: 10085): cannot open "ubi!_0x0", error -19 05:52:38 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 05:52:38 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc8214"], 0x61) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2366.743509][T10167] UBIFS error (pid: 10167): cannot open "ubi!_0x0", error -19 05:52:38 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fchmod(r0, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000180)={0x2}) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 05:52:38 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2366.744207][T10172] UBIFS error (pid: 10167): cannot open "ubi!_0x0", error -19 [ 2366.806703][ T3841] UBIFS error (pid: 10172): cannot open "ubi!_0x0", error -19 [ 2366.861911][ T3841] UBIFS error (pid: 10172): cannot open "ubi!_0x0", error -19 05:52:38 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:38 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x11bdd000, 0x1000000}], 0x0) 05:52:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) [ 2366.987773][T10361] UBIFS error (pid: 10361): cannot open "ubi!_0x0", error -19 [ 2366.988556][ T3841] UBIFS error (pid: 10361): cannot open "ubi!_0x0", error -19 05:52:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x107f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/audio\x00', 0x100, 0x0) getsockopt$netlink(r2, 0x10e, 0x3, &(0x7f0000000680)=""/192, &(0x7f0000000740)=0xc0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) getsockname$ax25(r0, &(0x7f0000000280)={{0x3, @rose}, [@netrom, @bcast, @null, @rose, @bcast, @null]}, &(0x7f0000000300)=0x48) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000480)={@rand_addr, @broadcast}, &(0x7f00000004c0)=0xc) r5 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) r6 = geteuid() getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) write$FUSE_ENTRY(r5, &(0x7f0000000580)={0x90, 0x0, 0x3, {0x2, 0x0, 0x2, 0x2, 0x9, 0x9, {0x0, 0x1f, 0x5, 0x1, 0x0, 0x205e, 0xaa8d, 0x3, 0x8, 0x8, 0x3cb, r6, r7, 0x6, 0x8}}}, 0x90) ioctl$KDGKBDIACR(r5, 0x4b4a, &(0x7f00000001c0)=""/183) r8 = getpgid(0xffffffffffffffff) ioctl$EVIOCGBITSND(r4, 0x80404532, &(0x7f00000013c0)=""/4096) sched_setparam(r8, &(0x7f0000000340)=0xd47) finit_module(r0, &(0x7f0000000640)='cpusetselfproc(wlan1\x00', 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000380)={0xc72a, 0x3, {0x1, 0x2, 0x4, 0x2, 0x800}}) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x42, 0x0) accept$netrom(r9, &(0x7f0000000100)={{0x3, @default}, [@bcast, @bcast, @default, @rose, @default, @rose, @rose]}, &(0x7f0000000040)=0x48) [ 2367.025785][T10363] UBIFS error (pid: 10363): cannot open "ubi!_0x0", error -19 05:52:38 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2367.037060][ T3841] UBIFS error (pid: 10363): cannot open "ubi!_0x0", error -19 05:52:38 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:38 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7bd48e6d7a952e52e738846e25"], 0x91) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2367.146748][T10431] UBIFS error (pid: 10431): cannot open "ubi!_0x0", error -19 [ 2367.181967][ T3841] UBIFS error (pid: 10431): cannot open "ubi!_0x0", error -19 05:52:38 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 05:52:38 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000002c0)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, {&(0x7f0000000080)=""/79, 0x4f}, &(0x7f0000000100), 0x2}, 0xa0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000200)=0x6) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x4, 0x0) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000240)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80200, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) [ 2367.339745][T10601] UBIFS error (pid: 10601): cannot open "ubi!_0x0", error -19 [ 2367.340554][ T3841] UBIFS error (pid: 10601): cannot open "ubi!_0x0", error -19 05:52:38 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2367.386291][T10606] UBIFS error (pid: 10606): cannot open "ubi!_0x0", error -19 [ 2367.398037][ T3841] UBIFS error (pid: 10606): cannot open "ubi!_0x0", error -19 05:52:38 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:39 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc8214"], 0x61) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2367.563684][T10700] UBIFS error (pid: 10700): cannot open "ubi!_0x0", error -19 [ 2367.580806][T10792] UBIFS error (pid: 10700): cannot open "ubi!_0x0", error -19 [ 2367.648322][T10792] UBIFS error (pid: 10792): cannot open "ubi!_0x0", error -19 [ 2367.703937][ T3841] UBIFS error (pid: 10792): cannot open "ubi!_0x0", error -19 05:52:39 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x13d48000, 0x1000000}], 0x0) 05:52:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1000000001) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x1c281) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000180)={0x49, 0xc7d9, 0x4000000000}, 0xc) dup(r0) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x1f, 0x2, 0x4}, 0xf) 05:52:39 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 05:52:39 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:39 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc8214"], 0x61) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2367.966565][T10928] UBIFS error (pid: 10928): cannot open "ubi!_0x0", error -19 [ 2367.967319][ T3841] UBIFS error (pid: 10928): cannot open "ubi!_0x0", error -19 [ 2367.981930][T10933] UBIFS error (pid: 10933): cannot open "ubi!_0x0", error -19 [ 2367.990352][ T3841] UBIFS error (pid: 10933): cannot open "ubi!_0x0", error -19 05:52:39 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:39 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:39 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc8214"], 0x61) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:39 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x3, 0x0) memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000240), 0x2000010200000b) io_setup(0xb, &(0x7f0000000240)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x90002, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x9, 0x0, 0x2}, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) shmctl$IPC_RMID(0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x4}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1, 0x0) getsockopt$ax25_int(r3, 0x101, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x4) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000200)) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000500)=""/4096) [ 2368.219248][ T3841] UBIFS error (pid: 11144): cannot open "ubi!_0x0", error -19 [ 2368.228895][T11144] UBIFS error (pid: 11146): cannot open "ubi!_0x0", error -19 [ 2368.231225][T11146] UBIFS error (pid: 11144): cannot open "ubi!_0x0", error -19 [ 2368.234999][ T3841] UBIFS error (pid: 11146): cannot open "ubi!_0x0", error -19 05:52:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 05:52:39 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2368.535315][T11299] UBIFS error (pid: 11299): cannot open "ubi!_0x0", error -19 [ 2368.536412][ T3841] UBIFS error (pid: 11299): cannot open "ubi!_0x0", error -19 05:52:40 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d788826"], 0x79) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:40 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:40 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 05:52:40 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x13d52000, 0x1000000}], 0x0) 05:52:40 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2368.858816][ T3841] UBIFS error (pid: 11361): cannot open "ubi!_0x0", error -19 [ 2368.873093][ T3841] UBIFS error (pid: 11361): cannot open "ubi!_0x0", error -19 05:52:40 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2368.916401][T11369] UBIFS error (pid: 11369): cannot open "ubi!_0x0", error -19 [ 2368.938632][ T3841] UBIFS error (pid: 11369): cannot open "ubi!_0x0", error -19 [ 2369.028089][ C1] net_ratelimit: 12 callbacks suppressed [ 2369.028120][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2369.040586][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:52:40 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d788826"], 0x79) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2369.080040][T11420] UBIFS error (pid: 11420): cannot open "ubi!_0x0", error -19 05:52:40 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2, 0x0) 05:52:40 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2369.080676][ T3841] UBIFS error (pid: 11420): cannot open "ubi!_0x0", error -19 [ 2369.267770][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2369.273584][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2369.279546][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2369.285323][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2369.291166][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2369.296979][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2369.310728][T11480] UBIFS error (pid: 11480): cannot open "ubi!_0x0", error -19 [ 2369.321806][T11148] UBIFS error (pid: 11480): cannot open "ubi!_0x0", error -19 05:52:40 executing program 5: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x80400) bind$isdn(r1, &(0x7f0000000040)={0x22, 0x2, 0xffffffffffffffd3, 0x80000000, 0xfffffffffffffe00}, 0x6) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x1c) 05:52:40 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 05:52:40 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d788826"], 0x79) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2369.411780][T11484] UBIFS error (pid: 11484): cannot open "ubi!_0x0", error -19 05:52:40 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3, 0x0) [ 2369.426529][ T3841] UBIFS error (pid: 11484): cannot open "ubi!_0x0", error -19 [ 2369.507690][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2369.513574][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2369.552737][T11505] UBIFS error (pid: 11505): cannot open "ubi!_0x0", error -19 [ 2369.553469][ T3841] UBIFS error (pid: 11505): cannot open "ubi!_0x0", error -19 05:52:41 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x13d63000, 0x1000000}], 0x0) 05:52:41 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:41 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4, 0x0) 05:52:41 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350f01e7b"], 0x85) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 05:52:41 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0xaaaac0f, &(0x7f0000000040), 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file0/../file0\x00', 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x80000001) [ 2369.876055][ T3841] UBIFS error (pid: 11798): cannot open "ubi!_0x0", error -19 [ 2369.890339][ T3841] UBIFS error (pid: 11798): cannot open "ubi!_0x0", error -19 [ 2369.920811][T11809] UBIFS error (pid: 11809): cannot open "ubi!_0x0", error -19 05:52:41 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xc0', 0x0, 0x0) [ 2369.928995][ T3841] UBIFS error (pid: 11809): cannot open "ubi!_0x0", error -19 05:52:41 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x5, 0x0) 05:52:41 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d788826"], 0x79) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 05:52:41 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2370.247750][T12010] UBIFS error (pid: 12010): cannot open "ubi!_0x0", error -19 [ 2370.252527][ T3841] UBIFS error (pid: 12010): cannot open "ubi!_0x0", error -19 05:52:41 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x501100, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xc140825}, 0xc, &(0x7f0000000680)={&(0x7f0000000300)={0x364, 0x6, 0x5, 0x8, 0x70bd27, 0x25dfdbfb, {0xf, 0x0, 0x4}, [@nested={0x2b8, 0x74, [@generic="33fb763aa0f2275cca4e960144c72b6feb2e0839bea8378624245cb9b0d5e25fb06d78332e5416e007b303c11f3dcb2ae385d856cd5df237e005d49988801e1da94328d32276535fbc40dd97bb000f00a9916ffeec9b736a5c8ef346129771553e8ac68742b32342b7c81566a85547d2c42e806910d95aac72d8074200cf511524f37233d70b9dc6a3e70ecc91a9649661a02d236563f93ef55d5ef4dbb664e489403bfbf2432147786870786ae7f038e258e6d04f0715fbdce95577b98d5411b9adbf906e662c24c73a9f94e0631757dd42efccf7e320a0f95657c5cd35c3f56b865abd", @generic="162bf91c136097199dcdf0c8767492c06119a61a22498836f79b6347cb314e7c3d138e81ae1887bd854bd9fd99f0511798c138420d43d0ba60bf90433cbb488be2c46f93df3e082c2eeb6dd3af5515a66aaddaf80d78d1741a63fc249cc45feee0f680f4c5724f98a112d420b104609b407e7b7e73f53b4637464349c5aa6ab4734ca1340c7a89b1b8a544629a3e7814a2c126d9e238e951ad93a0c0b236d90433e0b5605f08669e34117e045dcc8d7ac1d9543ee4b36596ec0c8c178d0988ae632e59732a81d1dd8d5ca576e5d65b22f6451d67d773e3fb376971ed59cb92608c3efc87c9252b28ce7a5ccd", @generic="1da436f5c3261f3cf1dc75cb8758ec1a116d5b625b07dff2b063110c962e21688e88673e51d581c533415f0971919f6d847a36243f4f8341ba7d5a80e741dcd7520e4b83c77315f58c4030edc8231d42ab7855e466a451a0978ca827a3b672b574d12cc2c735d6b232a72cd10a39a6fb7526997f4066ae362d7f24b6c45fa977237dfb09410d3dcb33cb9d880fc0a32cbd658f157cc33a21aa31654f7d086de1f1d898a95be4e15de962251d7791ee55591c56c4e8f820031335326cf68d0f2810e538b54fe8df278448773a5127d41fec3601b7ecfae4c265407e", @typed={0x8, 0x91, @u32=0x6}]}, @generic="18222cb998f99edabe5a84102cbbb6c066e9dafd33263ed364453e", @generic="404cc1ec8fa4054ba2c08b45c254cf83d2527ca3efedbce65907cab95637bd43d739a34d07897143af07f1d7b7bbbc72fd169a46d9c198b56860648b9bf8dcd752732b191156a808fc1a48ea17a8d62d4d6a8320babf073ee2a5ceada933d91596021202e56bdf5ecca0cb48d627ccef4f0097f4487ecc", @typed={0x4, 0x5}]}, 0x364}, 0x1, 0x0, 0x0, 0x20040840}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)="3d4b6e828558574b8cbc663621e65253ccd2450ab6b1364f38189fc46e9291eebe9feff0d8c71883f42bdd88313d24ed1fbe3e955d804628469ab856ab7d1800e145a51934771a465005d7d4b735607f7f6e10cdd140fb65c0db9231cdc82ad834428857c566cee2fc5a11eb99b66e2412b057d6e6d4ed88752b775fe5224a69ef6416cb8cf52629771b36a9db69dfd4fda4fe66fa791347308e9472fb435876421f9d73ae719b7969a320", 0xab, 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='syzkaller\x00', &(0x7f0000000240)='vmnet0!\x00') r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xfff}) [ 2370.355126][T12069] UBIFS error (pid: 12069): cannot open "ubi!_0x0", error -19 [ 2370.363632][ T3841] UBIFS error (pid: 12069): cannot open "ubi!_0x0", error -19 05:52:42 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x13e02000, 0x1000000}], 0x0) 05:52:42 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6, 0x0) 05:52:42 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d788826"], 0x79) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:42 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) 05:52:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) [ 2370.657516][T12234] UBIFS error (pid: 12234): cannot open "ubi!_0x0", error -19 [ 2370.663843][ T3841] UBIFS error (pid: 12234): cannot open "ubi!_0x0", error -19 05:52:42 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x80002, 0x58) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140), 0xfffffffffffffebd) r1 = userfaultfd(0x80000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00008d9000/0x3000)=nil, 0x3000}, 0x1}) close(r1) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8ebd, 0x8000) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x10000000}) 05:52:42 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7, 0x0) 05:52:42 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d788826"], 0x79) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:42 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2370.866539][T12375] UBIFS error (pid: 12375): cannot open "ubi!_0x0", error -19 [ 2370.869754][ T3841] UBIFS error (pid: 12375): cannot open "ubi!_0x0", error -19 05:52:42 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x48, 0x0) [ 2370.983422][T12418] UBIFS error (pid: 12418): cannot open "ubi!_0x0", error -19 05:52:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) [ 2370.988241][T12461] UBIFS error (pid: 12418): cannot open "ubi!_0x0", error -19 [ 2371.042598][T12461] UBIFS error (pid: 12461): cannot open "ubi!_0x0", error -19 05:52:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0xa0}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = socket$inet6(0xa, 0xf, 0x400) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xc8, 0xc00) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000140)={0x2, 0xfffffffffffffb80, 0x1f}) [ 2371.081927][ T3841] UBIFS error (pid: 12461): cannot open "ubi!_0x0", error -19 05:52:42 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x13e60000, 0x1000000}], 0x0) 05:52:42 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:42 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c"], 0x7f) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:42 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4c, 0x0) 05:52:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) 05:52:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x5444, 0x10}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0xff}, &(0x7f00000001c0)=0x8) socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r1) ioctl$KVM_GET_ONE_REG(r4, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) [ 2371.423576][T12676] UBIFS error (pid: 12674): cannot open "ubi!_0x0", error -19 [ 2371.435253][ T3841] UBIFS error (pid: 12676): cannot open "ubi!_0x0", error -19 [ 2371.458503][ T3841] UBIFS error (pid: 12674): cannot open "ubi!_0x0", error -19 05:52:42 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:42 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x68, 0x0) [ 2371.478413][ T3841] UBIFS error (pid: 12676): cannot open "ubi!_0x0", error -19 [ 2371.587227][T12771] UBIFS error (pid: 12771): cannot open "ubi!_0x0", error -19 [ 2371.589288][ T3841] UBIFS error (pid: 12771): cannot open "ubi!_0x0", error -19 05:52:43 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c"], 0x7f) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:43 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6c, 0x0) 05:52:43 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:43 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) [ 2371.843812][T12897] UBIFS error (pid: 12897): cannot open "ubi!_0x0", error -19 [ 2371.850948][ T3841] UBIFS error (pid: 12897): cannot open "ubi!_0x0", error -19 05:52:43 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x13f74000, 0x1000000}], 0x0) 05:52:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x40, 0x800, 0x2}, 0x2c) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001200)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000001240)={0x101, 0xdab, 0x0, @local, 'veth0_to_hsr\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001280)={r0, &(0x7f0000000040)='!', &(0x7f0000001180)}, 0x20) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000001180)='/dev/vfio/vfio\x00', 0x2000, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000011c0), 0x4) socket$inet6(0xa, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x400000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000080), &(0x7f0000001180), 0x2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), &(0x7f0000000180)=""/4096}, 0x18) 05:52:43 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x74, 0x0) 05:52:43 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c"], 0x7f) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:43 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:43 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xc3ffffff}, 0x0) [ 2372.119177][T13008] UBIFS error (pid: 13008): cannot open "ubi!_0x0", error -19 [ 2372.119971][ T3841] UBIFS error (pid: 13008): cannot open "ubi!_0x0", error -19 05:52:43 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7a, 0x0) 05:52:43 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:43 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c350"], 0x82) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:43 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf0, 0x0) 05:52:43 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) 05:52:43 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xc3ffffff}, 0x0) [ 2372.410443][T13224] UBIFS error (pid: 13224): cannot open "ubi!_0x0", error -19 [ 2372.411857][ T3841] UBIFS error (pid: 13224): cannot open "ubi!_0x0", error -19 05:52:43 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x13fc6000, 0x1000000}], 0x0) 05:52:43 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:43 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x300, 0x0) 05:52:44 executing program 5: clone(0x800000011ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0xa000) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth0_to_team\x00'}) [ 2372.606476][T13309] UBIFS error (pid: 13309): cannot open "ubi!_0x0", error -19 [ 2372.607169][ T3841] UBIFS error (pid: 13309): cannot open "ubi!_0x0", error -19 [ 2372.625504][T13317] UBIFS error (pid: 13317): cannot open "ubi!_0x0", error -19 05:52:44 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:44 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x500, 0x0) 05:52:44 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c"], 0x7f) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2372.641315][ T3841] UBIFS error (pid: 13317): cannot open "ubi!_0x0", error -19 05:52:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) [ 2372.767040][T13404] UBIFS error (pid: 13404): cannot open "ubi!_0x0", error -19 [ 2372.767700][T13423] UBIFS error (pid: 13404): cannot open "ubi!_0x0", error -19 05:52:44 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x3080, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x100) [ 2372.783542][T13423] UBIFS error (pid: 13423): cannot open "ubi!_0x0", error -19 [ 2372.832262][ T3841] UBIFS error (pid: 13423): cannot open "ubi!_0x0", error -19 05:52:44 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x600, 0x0) [ 2372.940143][T13564] UBIFS error (pid: 13564): cannot open "ubi!_0x0", error -19 [ 2372.945382][ T3841] UBIFS error (pid: 13564): cannot open "ubi!_0x0", error -19 05:52:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xff000000}, 0x0) [ 2373.062750][T13597] UBIFS error (pid: 13597): cannot open "ubi!_0x0", error -19 [ 2373.064248][ T3841] UBIFS error (pid: 13597): cannot open "ubi!_0x0", error -19 05:52:44 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x15d6a000, 0x1000000}], 0x0) 05:52:44 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c"], 0x7f) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:44 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:44 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x700, 0x0) 05:52:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xffffa888}, 0x0) 05:52:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv6_newaddr={0x2c, 0x14, 0x3353cd1e187a4f97, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) connect$packet(r0, &(0x7f0000000000)={0x11, 0x2, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) [ 2373.231929][T13776] UBIFS error (pid: 13776): cannot open "ubi!_0x0", error -19 [ 2373.247582][T13783] UBIFS error (pid: 13776): cannot open "ubi!_0x0", error -19 [ 2373.250032][ T3841] UBIFS error (pid: 13783): cannot open "ubi!_0x0", error -19 [ 2373.304833][ T3841] UBIFS error (pid: 13783): cannot open "ubi!_0x0", error -19 05:52:44 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:44 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1020, 0x0) 05:52:44 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c"], 0x7f) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2373.468111][T13864] UBIFS error (pid: 13864): cannot open "ubi!_0x0", error -19 05:52:44 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2373.475978][ T3841] UBIFS error (pid: 13864): cannot open "ubi!_0x0", error -19 05:52:45 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1f00, 0x0) 05:52:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 2373.634860][T14001] UBIFS error (pid: 14001): cannot open "ubi!_0x0", error -19 [ 2373.651333][ T3841] UBIFS error (pid: 14001): cannot open "ubi!_0x0", error -19 05:52:45 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x15d9d000, 0x1000000}], 0x0) 05:52:45 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000180)) write$cgroup_int(r1, &(0x7f0000000080), 0x12) write$cgroup_int(r1, &(0x7f0000000140)=0x2008, 0x12) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000000c0)={r2, 0x2}) 05:52:45 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1f26, 0x0) 05:52:45 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:45 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07c3"], 0x81) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:45 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2000, 0x0) [ 2373.976198][T14114] UBIFS error (pid: 14114): cannot open "ubi!_0x0", error -19 05:52:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xffffffc3}, 0x0) [ 2373.976916][ T3841] UBIFS error (pid: 14114): cannot open "ubi!_0x0", error -19 05:52:45 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:45 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:45 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2010, 0x0) [ 2374.188395][T14249] UBIFS error (pid: 14249): cannot open "ubi!_0x0", error -19 05:52:45 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) futimesat(r0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000140)={{}, {0x0, 0x2710}}) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000300)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}], [], 0xb00000000000000}) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x2) [ 2374.191657][ T3841] UBIFS error (pid: 14249): cannot open "ubi!_0x0", error -19 05:52:45 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2374.395557][T14348] UBIFS error (pid: 14348): cannot open "ubi!_0x0", error -19 [ 2374.397620][T14344] UBIFS error (pid: 14348): cannot open "ubi!_0x0", error -19 [ 2374.479726][T14344] overlayfs: workdir is in-use by another mount, mount with '-o index=off' to override exclusive workdir protection. 05:52:45 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x15e2d000, 0x1000000}], 0x0) 05:52:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) 05:52:45 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x261f, 0x0) 05:52:45 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:45 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c"], 0x7f) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:46 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3f00, 0x0) [ 2374.622542][T14389] UBIFS error (pid: 14389): cannot open "ubi!_0x0", error -19 05:52:46 executing program 5: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="23000000079dd03fe36424491633d61e00"], 0x11) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x2, @hyper}, 0xfffffffffffffe29, 0x800) accept4$vsock_stream(r2, &(0x7f00000001c0)={0x28, 0x0, 0xfffffffb, @reserved}, 0x10, 0x80800) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 05:52:46 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2374.637947][ T3841] UBIFS error (pid: 14389): cannot open "ubi!_0x0", error -19 05:52:46 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c"], 0x7f) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2374.816075][T14569] UBIFS error (pid: 14569): cannot open "ubi!_0x0", error -19 [ 2374.817117][ T3841] UBIFS error (pid: 14569): cannot open "ubi!_0x0", error -19 05:52:46 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4800, 0x0) 05:52:46 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:46 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) [ 2374.948225][T14605] UBIFS error (pid: 14605): cannot open "ubi!_0x0", error -19 05:52:46 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x15f84000, 0x1000000}], 0x0) [ 2374.948973][T14662] UBIFS error (pid: 14605): cannot open "ubi!_0x0", error -19 [ 2375.003190][T14662] UBIFS error (pid: 14662): cannot open "ubi!_0x0", error -19 05:52:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x10, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5b, 0x57, 0x10}}, &(0x7f0000000000)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7, 0x101000) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000000c0)=0x81, &(0x7f0000000100)=0x2) close(r0) 05:52:46 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4c00, 0x0) [ 2375.026085][ T3841] UBIFS error (pid: 14662): cannot open "ubi!_0x0", error -19 05:52:46 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:46 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c"], 0x7f) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2375.132966][T14764] UBIFS error (pid: 14764): cannot open "ubi!_0x0", error -19 [ 2375.136485][ T3841] UBIFS error (pid: 14764): cannot open "ubi!_0x0", error -19 [ 2375.187197][T14810] UBIFS error (pid: 14810): cannot open "ubi!_0x0", error -19 [ 2375.187985][ T3841] UBIFS error (pid: 14810): cannot open "ubi!_0x0", error -19 05:52:46 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6800, 0x0) [ 2375.264811][ C1] net_ratelimit: 28 callbacks suppressed [ 2375.264820][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2375.276434][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:52:46 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) sendto$unix(r0, &(0x7f00000001c0)="7351a05294871e18dffb0e31730f28e4a1ebed86b61a521a13fc2a88fc09618e035fc2ca1bcd08df2b636c2b7b955dd8039e3c3d5d7da4af44ee45b257a6232f804b295733d6444ebcb85e940f4c8b4dc64c0ac05b0db9640eea025c729552f2ef5f5956c0826e287d61247636184d02daaedb836a8628e771cd8d0c17d0ee18d3bd737efb2b6dcefdda17f7f777e0510521", 0x92, 0x0, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) mount(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f00000002c0)={0x10004, 0x4000}) mount(&(0x7f00000004c0)=@filename='./file0\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x3080, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x3080, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000140)=0x4) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 05:52:46 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 05:52:46 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(0xffffffffffffffff, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2375.401469][T14907] UBIFS error (pid: 14907): cannot open "ubi!_0x0", error -19 05:52:46 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6c00, 0x0) 05:52:46 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2375.406238][ T3841] UBIFS error (pid: 14907): cannot open "ubi!_0x0", error -19 [ 2375.504695][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2375.510513][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:46 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x15f90000, 0x1000000}], 0x0) [ 2375.516358][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2375.522139][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2375.528035][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2375.533817][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:47 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7400, 0x0) [ 2375.578435][T15063] UBIFS error (pid: 15063): cannot open "ubi!_0x0", error -19 05:52:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(0xffffffffffffffff, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:47 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2375.581225][ C0] UBIFS error (pid: 15063): cannot open "ubi!_0x0", error -19 [ 2375.664984][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2375.678741][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:47 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7a00, 0x0) 05:52:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 05:52:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') mount(&(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYBLOB="52b1e485e7aaa461478d3609a44d24d02526a04c74fde8dcc319a88ac5e7c3505a3cffa15ccb8ced625c9b2092537100c727251cf9dc8a32700d474b400c22527498ff01d7ac99ef48a96a53ee66e1b074837f8ad6d5d93990ee7eaf0180848601938c7e2931ae", @ANYRESOCT=r1, @ANYRESDEC=r0, @ANYBLOB="4d0707dc4245208a39216a62d6f906937985e73fb79bdca411fccf62c60b4c2ffaabcbc72fccbb043f2a9f69f57d513c7cd78dae81aa1a6b24b49c4f66a8f0957ce7a502cb63059b96910e9c922202b72303a8fea378db03f5f2db16428d3ff331ae77d6c7011389dc42c0bcac90b31479b8b4de80c3e9b40617cd8a04bc24fa8037713d9f48997693d8ec9d22126b3f7f160953a9fdf0f76ee3bb8f793373776339f1798d06882a445336a909f46b3c763b5116460223edafa1a55b0532f02ff880553802f5fa008e3d58ba4789384a9fc14db49e01c5e45fe79ed593406a53940d334a", @ANYBLOB="ea9457d9a58133cb877faa12d2de3ac8934e41791c4e8c662df7f8aaa4c60c5ca6e16dac39cff85928d292b95e826574a0d662789e391a48c24cd71af78b43e8a2f01cbd2a7080705a19fd083e5d81beab6499805fec64a6ce9ea14ec3c7cfadf51a003706d68f8f62630af3bcd3ba7cd95909100ac700f1ff913bfa9f7683cae124a8cd83898840623c31db73deee545427040cd3c4a24a18e1844d879f669e7f47ce4354d4bd230eeb1161dc25361286bc78c65d5e58a4aea5876f293ccf6efee0c513a72628769d2fea660b90dfda2e31898d"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',lowerdir=.:file0,workdir=.']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000680)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000007c0)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) accept4(r1, &(0x7f0000000b40)=@can={0x1d, 0x0}, &(0x7f0000000bc0)=0x80, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001180)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000011c0)={'team0\x00', 0x0}) accept$packet(r1, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001240)=0x14) accept4$packet(r2, &(0x7f0000001400)={0x11, 0x0, 0x0}, &(0x7f0000001440)=0x14, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001480)={0x0, @empty, @loopback}, &(0x7f00000014c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001680)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001780)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000017c0)={0x0, @multicast2, @local}, &(0x7f0000001800)=0xc) getsockname$packet(r2, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000018c0)=0x14) getpeername(r2, &(0x7f0000002680)=@hci={0x1f, 0x0}, &(0x7f0000002700)=0x80) getpeername$packet(r2, &(0x7f0000002740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002780)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000005740)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000006840)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000006a40)={{{@in6=@ipv4={[], [], @empty}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000006b40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000007180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80002000}, 0xc, &(0x7f0000007140)={&(0x7f0000006b80)={0x5b4, r3, 0x0, 0x70bd26, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0x1b4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6cea4aa}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7c94}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4a8}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}]}}, {{0x8, 0x1, r11}, {0x168, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x89c2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r13}, {0xf8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}]}}, {{0x8, 0x1, r17}, {0x16c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7b1747f4}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5a}}}]}}]}, 0x5b4}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000b00)=0x1) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)=0x200000, 0x4) mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='bfs\x00', 0x0, &(0x7f0000000380)='%}\x00') getgroups(0x0, &(0x7f00000001c0)) getdents64(r2, &(0x7f0000000240)=""/65, 0x18) 05:52:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(0xffffffffffffffff, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2375.828139][T15139] UBIFS error (pid: 15139): cannot open "ubi!_0x0", error -19 05:52:47 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xedc0, 0x0) 05:52:47 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2375.828783][ T3841] UBIFS error (pid: 15139): cannot open "ubi!_0x0", error -19 05:52:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:47 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x15fa3000, 0x1000000}], 0x0) 05:52:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 05:52:47 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf000, 0x0) [ 2376.017773][ T3841] UBIFS error (pid: 15273): cannot open "ubi!_0x0", error -19 [ 2376.029360][ T3841] UBIFS error (pid: 15273): cannot open "ubi!_0x0", error -19 05:52:47 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1004) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfd2e, 0x0, 0x0, 0xfffffffffffffff8) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000001640)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000080)={0x0, 0x41e49f14}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f00000000c0)=""/4, 0x4, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r3, 0x10, &(0x7f0000000180)={&(0x7f0000000040)=""/23, 0x17, r4}}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) ustat(0x5, &(0x7f0000000200)) 05:52:47 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf0ffff, 0x0) [ 2376.218396][T15405] UBIFS error (pid: 15405): cannot open "ubi!_0x0", error -19 [ 2376.226977][ T3841] UBIFS error (pid: 15405): cannot open "ubi!_0x0", error -19 05:52:47 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) 05:52:47 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000000, 0x0) [ 2376.442032][T15506] UBIFS error (pid: 15506): cannot open "ubi!_0x0", error -19 [ 2376.451375][ T3841] UBIFS error (pid: 15506): cannot open "ubi!_0x0", error -19 [ 2376.528938][T15574] UBIFS error (pid: 15574): cannot open "ubi!_0x0", error -19 05:52:47 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2376.533985][ T3841] UBIFS error (pid: 15574): cannot open "ubi!_0x0", error -19 [ 2376.674033][ T3841] UBIFS error (pid: 15683): cannot open "ubi!_0x0", error -19 [ 2376.681086][ T3841] UBIFS error (pid: 15683): cannot open "ubi!_0x0", error -19 05:52:48 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x17afa000, 0x1000000}], 0x0) 05:52:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(0xffffffffffffffff, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x80, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000180)) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)) 05:52:48 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2000000, 0x0) 05:52:48 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x600000000000000}, 0x0) [ 2376.793242][ T3841] UBIFS error (pid: 15690): cannot open "ubi!_0x0", error -19 [ 2376.817252][T15730] UBIFS error (pid: 15690): cannot open "ubi!_0x0", error -19 05:52:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(0xffffffffffffffff, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:48 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3000000, 0x0) [ 2376.852106][T15730] UBIFS error (pid: 15730): cannot open "ubi!_0x0", error -19 [ 2376.903773][ T3841] UBIFS error (pid: 15730): cannot open "ubi!_0x0", error -19 05:52:48 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3f) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20100060}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa8, r1, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf16}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x99269d2909d5b4f6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xcb65}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x26}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffffb}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffff7}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20044894}, 0x44000) 05:52:48 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) [ 2376.963079][T15882] UBIFS error (pid: 15882): cannot open "ubi!_0x0", error -19 [ 2376.964939][ T3841] UBIFS error (pid: 15882): cannot open "ubi!_0x0", error -19 05:52:48 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4000000, 0x0) 05:52:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800000000000000}, 0x0) 05:52:48 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x17afb000, 0x1000000}], 0x0) 05:52:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(0xffffffffffffffff, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2377.156771][T15985] UBIFS error (pid: 15985): cannot open "ubi!_0x0", error -19 05:52:48 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f00000001c0)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@local, @ipv4={[], [], @loopback}, @dev={0xfe, 0x80, [], 0x24}, 0x4a6412c3, 0x6, 0x7, 0x100, 0x7, 0x2100020, r2}) 05:52:48 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:48 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x5000000, 0x0) [ 2377.158477][ T3841] UBIFS error (pid: 15985): cannot open "ubi!_0x0", error -19 [ 2377.352139][T16118] hfsplus: unable to find HFS+ superblock 05:52:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, 0xffffffffffffffff, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2377.381635][T16118] UBIFS error (pid: 16182): cannot open "ubi!_0x0", error -19 [ 2377.418847][T16196] UBIFS error (pid: 16196): cannot open "ubi!_0x0", error -19 [ 2377.422380][T16182] UBIFS error (pid: 16196): cannot open "ubi!_0x0", error -19 05:52:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xa00000000000000}, 0x0) [ 2377.430753][T16118] UBIFS error (pid: 16182): cannot open "ubi!_0x0", error -19 05:52:49 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, 0xffffffffffffffff, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:49 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) 05:52:49 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6000000, 0x0) [ 2377.685413][T16374] UBIFS error (pid: 16374): cannot open "ubi!_0x0", error -19 05:52:49 executing program 5: r0 = memfd_create(&(0x7f0000002000)='/{\x06\x001ppp1%:em0\xf9', 0x0) r1 = syz_open_dev$media(&(0x7f0000000540)='/dev/media#\x00', 0xfffffffffffffff9, 0x100) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000005c0)={0x0, 0x60, "97222855afaafc0ba4657a283c02515c63f8f59ff66eb3cedd4762b466e6304946ab4823c99f0064f876a68c9d23a7b72068463779cddff7bbd05de87884df77586cd282004e6b2327edfb6f30b8d2df715182182822587498c23b93a1265a2d"}, &(0x7f0000000640)=0x68) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000680)={r2, 0x3}, &(0x7f00000006c0)=0x8) timer_create(0x2, 0x0, &(0x7f0000000000)) r3 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x7, 0x400) getsockopt$inet_tcp_buf(r3, 0x6, 0x1f, &(0x7f0000000440)=""/163, &(0x7f0000000500)=0xa3) write$binfmt_elf64(r0, &(0x7f0000002040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x40}, [{}]}, 0x78) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000)={{}, {0x0, 0x989680}}, 0x0) shutdown(r3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x9, 0xd8, 0xa000000000000000, 0x100, 0x0, 0x17e7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xa57}}, 0x0, 0x800, 0x4, 0x3, 0xfffffffffffffff7}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000180)={r5, 0xd68c, 0x30, 0x8000, 0x5b8}, &(0x7f00000001c0)=0x18) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="020225bd7000fedbdf251600000064000500080001006962000008000100756470002c0002000800010008000000080003000000008008000100150000000800040000800000080003000400000024000200080004000700000008000300b2000000080001000900000008000400e0684865280006000400020008000100010000000800010006000000040002000400020008000100000100005000050014000200080003000000000008000300ff0700000c00020008000400010000002c00020008000200bbcb000008000200040000000800020020000000080001001400000008000300bdeaffff"], 0xf0}, 0x1, 0x0, 0x0, 0x40}, 0x4000001) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f0000000240)=0x142c) ioctl$KVM_SET_SIGNAL_MASK(r3, 0x4004ae8b, &(0x7f00000020c0)={0x1000, "ba3e8e3f7eec167baf6b6a7fe5744dd7ccf872e65b0f9e354626a44b8337462213ab4111ce73491070c1826d89968e38b555a550b2b5a965bc7b2a8387893f50a891bcfb410e7875c45cbde9c7d1b0132a56f817cf71b22b6f83d881197586ea760aee5fa120757b5e0b6b02e95febd3348dea20b48e1a8ce11d462101936b46ef35122d1f97b92c4d96689aeea4c67c87b0e0f945aa215d2989d6e9672e202c495b82b0cd5fdcdb6ca6ec28ed7bd70cad2e3968194b4074378fc5361805d870e1235ed5ae61aa0feaac660b1c6427b6da93a5bf3bf957a2359864dcd1f563ce77f32178a880296d59b787910129b74ca75e5d4369dee3535696d8c596264938bf2baea89a6ee409c9350d391fc6018a69668afa970e046c88ad8e81e0dc8d898bb09531cb20ea399bfca3bb3306aa91447f05af7b23b5e45d009677f9eb91fae4ad196e3c6855b36b8f5437948d7db4d66fee0952d700e6c49438f2dcb615188cfae9eca589bd303bcd162672b8b2d6774024a6b75380e16fa917ae8f5ccae7ed94103911e59cc4d995e5fa3dac3271a3dc3b36f099b827b3e39c5043a0280776973cddf38302b922c18f24533bdf6f7f528ea7c90b586a0cdbe50ea37d8cb400dd378e3dacb8a2ca25d1244bd89ea8c41e22b2e6f49fc69bda8133d53f065e0f4f6e422997707cd450681cc7a5e360ca4ae32d93e89cd9202ec9078ab0dc0ee1529bdf7e40861d597c89341079ad893e37415ad164f1caa903027f21b1f7a47cdb648df3347c9f3eb13527052f9aec77680b868ad5fff4147e4251fda36ceeff182bd006b714bd0a12bd14a9411bedb20b8fb4fbc5035aab43ee7fed202a38f364af6cf66852af522f141e662a8de210fee044fc44be0356e0189a5eb8dbc582b952f3190064f1a3f116a1451d957f3d92e5c2efba4b584004196d837cfcdb0360d77c45680e7d8371cd6421f3b4535d6eae0c4ea6ae723dfb43a99ad925557a6eb22fc83e87b77577decf6d8e51c042ebfeeb1d57399abf1046d2b7b71f8eddd64c424a9f21ed5d04756fd79cbc8e0ef049b4ed4bf59a06aa39cf4be7d22dbb4dfbb08c6fc3097f0c56b68362bd893d1abbb42bbfb5bdac1fb3a23ae8e98fad9d0cf0bb7c74dc760f0e1fe44868d238229a9f864bd6b138a28e061c69fd11df99e1b407b34259ab9b10447ab4ef134d5d5c95aeea0a6b53e2d7533af37adb1960b32a23e0cfcc8fb97c0d46eeab939e7e5f477afad5db5ce0b0f4faf4b41992a62fac64e67d5a00fa9b4ca0084a1f458768cd17cee5c1f13969108cd6187a2c5601212a446eb6e7953badfa0031d34af1692a54454fd311bb64aa1a370c404d475b54950bd6ea3f5322b5624cb09c959e1469834920f6618d266d2c38763e5552240fd1b91c132fa50b837eea29c36a190d3cdb02c6d5d1fa54b81000a332264bcd3c37ef04185b96cf8d0a2a57517f49f4c5bbe5dacfe5651afa341016bd6774a9f861e4617fe27e43ff7bd891aeaecf50f2e55b4310b6f842e35eeba67722a664c437f7c8ab02a0be55ac00c9c85cc2c6749da48c628775a39af457c3d166e83ddbd5340764e8dd16e8cde87cb8125abb858e14aa78d092389ebf3d92286e020b537bf79a148d9108b62495e02c829e2db98164db91d9434c99ef0cf7493870576f842b8befd4af4d1252a8c4ca85bc0bfce62e9e1afad61528ce25382538fa5e6093a7f4a10226d9cad4a7191c3f2d8b5798540f2dca58ee806e3d123256e8922d6ae73ac3e7772f6b8bc2b8b3d13a1414ca1c125d1849138e007bc52c23429652a5e9804a469e5e75acc45301a0d4571ce3e66241149f3f6a67307fd1c03179bc03429c4f47c335888885d159a96560c6509b7e21902950fbb79a666f85fa129a920648a0142c671a801a7ab5686b5a520f2c91ce563c70093d7e2d8415577252e460ad0b6fde2c26fcb2e000ec219d689a8af2b4849b8051d0b7772a561f4b770203f02188deb11de62710ca4a09a2919e52a9d2b61b98241f22a6bfc56353346cc4be872de987c74dde2044a7940606598f97dfd2ac028706cc83dd2b39e72edcb6fb2ed377e45b177ab8d7a39741d95a68825182b31ad4be88c1acc36ed9f03e15af102866a58e89b85c57b9beb5a9fc4fa92cfc5088bb42a33ce40ad25b3e5839d3faf254f60e8f314f101e8d6cea97f4bd9206aa4878adb804a048fc28ed28b9d0a2953655a1b617cd1570d49bfd052438fddd6e3161c1ffc426abce74317f6daeaec79baccfe5e05ed1889337ed9d59db199a68e4781a234da00036a892411445ed6425c97b3494d0acce0a1d2e37be3092708ad86137136f4874951afe4cfc0ad532c79afb29616525faa61230d24513a719cac210088d9f3271afced98966fdab7375704424e9ea03828bd8f0d8f92746fcd0847c1e10b0862ce46fdb3b61f37fbde994d06f82859538e6bf7642872ecbc00c15a399a9a227daaeebbdd0f47c0fe38a6a3f699fb4434af0285b5519a7885374ff949b800294c8112e3ad5883f7edb4a63da63066ec2a115cf426cf753cdd0087dc533c856870a7dedff918c96bfb8df751d20c6d444ced454c14138e79afa83b7c3dfc94a23fd020205e440e720750cdabd2479b39560bfe23f4e92cac7f7da2aac4bab0d82131ee6dcd71da322b8f8de903c6e25ed7558528b78a456598ca48f30abb36690de47c62071d40e7856a51361e6086c19add55b6b99cb1e9afe82c351968fd0eb200c40a4371be527d381e5422b8242089dcc01de061a3553e8e47fadc3516d005bf5debc508604972529f7812eff119ca8ca4c0a662d15771b3d3a6487e7acdbb5835dc17933a9b6a97129fccba974ed317c408a0f79c7332b7cae8a61105e7aa69d25951f14a0d472db3b4c73bbc5a928ce1888c96c68112aded269a7e7e399fc8843abf868252745b463943fec9ffa1f4c56486813de1873d3b434a5e17398b2a8c492d6f0480f00a012407c3b2004e2b3acff558e6de471fec81c60605ebd67bcfe3b78218cbd1beee9b9de9abc2b107f087ed194b0a9cd00718b49410f6dea9e457b454846eb8fe246464878c9d6657944cc44aad2ebe68807d461aa2e18e72207dbd84879e536ab52a932f461587e57f9ddfd1334808fb8f9ff667823423e465e43f24b089a79b25fb34294fe3c0a7823167a81197521fe8a2e959e478631c3c899067003483fb63863c6ed0ca681c7b430078cdbc2816b8132896bdce69cff56c9f00c253ba89bc0d3734c13e1067f8dfe8e465b9da5f7585a5d2342f28d98a953e9bdec26fabfae42ec2d7d1b80bcfe86332633e5345a58fd3ee2137aa80b09273de523c2a3dd121ed35a24bd88db031aac7d799c84ff34adc17fd0e91510ed8188940c492fd5d82c22ce2300d336fe6b32cbef5dc598b31c813521c6a8fe7f9a0a67546889431d92521d85dd413e5f86b32ce2416f46a5250f929bc7d9677e290d2cca47f8c0452b4e14408fd7c961556da30f70c060579d543f7774776434d1fba135ec796e49356e8b65989a91d1d7e748a4943e09e30b67a825dc84d19994ea89f9701b3560713601b7f45b8d2f6264240b01cb0307cff396d82db2c26cec4bedb3af4466adacb5cb7379b29edd5ce426600d1f27498425e14c6ed6e43cde8493de80c79c7887596fc0ebbcdaa21081ff340763342436299908329fde7e78badcdddc565e5623a7b3cf44f6e99518a004184e3e5267732e32d4cb5bad71222f4d52ec78bf4ca8698629f9b72d98b6eef0a53727013f80130668208817e2f6d357f33411292cf309212f4113ff46e7aee980c73b3e77c373c5b5388506d13577fc3be3e18187226130967e7a8567d4b87a103c45c0dca68cacd2a74bd605d977fa612b5ea91a3637106b87f480e30666ab4a03edebf992777df85037df0c161f2e34337785502b83317f8a56c99ede3fbc74dff8230ac11c65199f17626808abde0a41ac1dac3ac354ef5785ac9f69ff806d43673e661324d80eb2bf11e1d0a7ecc0d9c07fdb8b18231d57e7f9fab7609e09ff7e52cb0d26a0f5f2af8574a980844774bd9c98ea2336408afa530e8504959f5f48d890e08f83996c444db38525c640c0eaff25dabf4213db4ae9acff698aebf8e3d11aaaccac78b79161818273da16a0f7d6442cad9121e8dc879e151d073d278f69266ad61c9bd84c1c2683ccd1ab23a54d5c4b1e98833e1389217eb3f199bfe2162e48a23119ac8e6807ef68c4c33f121eedff74b0aca5de494137a5665726c311c69b6b59d71485731aed6eba13d4460b7d4cb0fc5b3a8e9666c042026fa37a1dab5fbd1ff858f2d5f2ab0a0a046da03e4f58d55cf4f16978b8d6abbb4ecaa104ba01793ac967bcba7e9a0a356de7b1b174d49f8a71a94491e8c9194b81fee3a38a42333e00a129808ee540590e2435dfc3020fde95507fdee7d9ce8b851277c56b8c81fc63f34c66405a72b745e3c6f68546ac03fc4b0a21a997ab86d35fe833834abc0cb1e9bf86c83093470ab2945c5873198c97359234710281a8e27ad41b0d6ec5b6c3c1c75aff58f2fbe49486e68dcd1da56192c1e135c788e420e9750dc18b7ef363deec84ac50cb06dd117f2fbe98cfcb2ad1d9271ff5df0dfceb41519f0105ddd035bcc040158f989b684ff005cfbd9a9beb13cb5bc8d7ee824f12becff0126634e1415fccdebc7ee55124013f0c90539d73de59a9aa261b464a2e7de4dc04a70440c86e522fd00ce6ac74bc3af212e5c2bde79fc0e44655395ad2ab44eb5297daa88951a807f74d7ff88433ce0d73b3c8576ac75ecda1b53807483fa0e067297dacb3e8e693b7d8cc322f24ff2fe07153e9a0eccf3fdae0fbad212c0aaa1fbab5bc5cebf250846c6094dec3bf9c6ed96398e3ba3d28ce9c47890560697e140e7e46ba06ddf186c91da0166d0630a40641bd15d6e004ee915a2c6c17c61c50b612a5df74675b8dc8a50ae89be880cd92ceaec8988415dab7fec1e399d98a444782bb325aa993cff6aef3c2857d4d9227c6adbd5bd65e1cccc02bd2755adbec5872e7083a4f279a8212289d6e0aed8995a5486a62dd80cf553dc867534ae13daa002cdbe648116fea5b58681b7c598cb14de28a0aa6f7952833aabe3a58a64beaf94731028c2f9e592a7f664ff8f4e7add2683fef11eb0a67f1fa152f938c2d6c0bbb2c5d7369d7a522d9459798763c5c1be6256bbe924e05a26e37ea25796aa9d80fa31e86da7548c7ad5e9501a9349063f94e44b50c9c056b43376806f3da6f7a8d18729f7e81ddc17d68c862795da95ffe25a2e0ab7d0cdb946582f9872c08f98e23553053bc33752022f25d721f4d021cc7880c13e161278d3e6ce6a48d7e7c8e3590c9175de56a931d3c0cf217dc7d14f0a45d2b3cb271820fcff4430456e88d08bdb3c85900614711604378814deb34c93d01d70cba6c88355efa88e0ec7491cc16b3a987ad67bdf726eb19ad687bd953fbdb281f6cd59caa081c82365de70aa3ca1f35903191829ac30a1540e6d50d138ccb641e21a93c3e36400a5b1b8e13c80bcdcd69efb815fc553b23dfcbdfea14d6089a841eef505629739d1d419de355779a8f9f35b2162a72dc385e2c67c0ae6402cc30aea39a58a28053400f39ec4af64cac591cfeef7605767aa6a3c6e55577404133bae409bd09a9caa3da5613e60c359783493e0bb965b2daf880f29a7af3940b33b7e1964d2c9c7c2dd50a5f08b9d9917f41f50651fe08547df0175f4873b898b4a56f6ff487bb2101962337"}) 05:52:49 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, 0xffffffffffffffff, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2377.689902][ T3841] UBIFS error (pid: 16374): cannot open "ubi!_0x0", error -19 05:52:49 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x19d9e000, 0x1000000}], 0x0) 05:52:49 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7000000, 0x0) 05:52:49 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) 05:52:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xc00000000000000}, 0x0) [ 2377.890447][T16395] UBIFS error (pid: 16395): cannot open "ubi!_0x0", error -19 [ 2377.891139][ T3841] UBIFS error (pid: 16395): cannot open "ubi!_0x0", error -19 05:52:49 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1f000000, 0x0) 05:52:49 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x0) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:49 executing program 5: 05:52:49 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) [ 2378.180983][T16607] UBIFS error (pid: 16607): cannot open "ubi!_0x0", error -19 05:52:49 executing program 5: 05:52:49 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x0) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2378.200280][ T3841] UBIFS error (pid: 16607): cannot open "ubi!_0x0", error -19 05:52:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xe00000000000000}, 0x0) 05:52:49 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2378.467011][T16644] UBIFS error (pid: 16644): cannot open "ubi!_0x0", error -19 [ 2378.473571][ T3841] UBIFS error (pid: 16644): cannot open "ubi!_0x0", error -19 05:52:50 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x19ff3000, 0x1000000}], 0x0) 05:52:50 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1f260000, 0x0) 05:52:50 executing program 5: 05:52:50 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x0) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:50 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xf9', 0x0, 0x0) 05:52:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) 05:52:50 executing program 5: 05:52:50 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x20000000, 0x0) 05:52:50 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x8c', 0x0, 0x0) 05:52:50 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, 0x6e) 05:52:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2379.398948][T16967] UBIFS error (pid: 16967): cannot open "ubi!_0x0", error -19 05:52:50 executing program 5: [ 2379.420216][ T3841] UBIFS error (pid: 16967): cannot open "ubi!_0x0", error -19 05:52:51 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1a82b000, 0x1000000}], 0x0) 05:52:51 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x20100000, 0x0) 05:52:51 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xf6', 0x0, 0x0) 05:52:51 executing program 5: 05:52:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 05:52:51 executing program 5: 05:52:51 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3f000000, 0x0) 05:52:51 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xfe', 0x0, 0x0) [ 2380.107986][T17189] UBIFS error (pid: 17189): cannot open "ubi!_0x0", error -19 05:52:51 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x48000000, 0x0) [ 2380.110059][ T3841] UBIFS error (pid: 17189): cannot open "ubi!_0x0", error -19 05:52:51 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, 0x6e) 05:52:51 executing program 5: 05:52:51 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2380.298134][T17219] UBIFS error (pid: 17219): cannot open "ubi!_0x0", error -19 [ 2380.299186][T17222] UBIFS error (pid: 17219): cannot open "ubi!_0x0", error -19 [ 2380.338659][T17222] UBIFS error (pid: 17222): cannot open "ubi!_0x0", error -19 [ 2380.353512][ T3841] UBIFS error (pid: 17222): cannot open "ubi!_0x0", error -19 05:52:51 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1a832000, 0x1000000}], 0x0) 05:52:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) 05:52:51 executing program 5: 05:52:51 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4c000000, 0x0) 05:52:51 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) [ 2380.536595][T17232] UBIFS error (pid: 17232): cannot open "ubi!_0x0", error -19 05:52:52 executing program 5: 05:52:52 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x68000000, 0x0) [ 2380.542235][ T3841] UBIFS error (pid: 17232): cannot open "ubi!_0x0", error -19 05:52:52 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:52 executing program 5: [ 2380.785155][T17353] UBIFS error (pid: 17353): cannot open "ubi!_0x0", error -19 [ 2380.802993][T17356] UBIFS error (pid: 17353): cannot open "ubi!_0x0", error -19 [ 2380.811825][ T3841] UBIFS error (pid: 17356): cannot open "ubi!_0x0", error -19 [ 2380.836185][ T3841] UBIFS error (pid: 17356): cannot open "ubi!_0x0", error -19 05:52:52 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, 0x6e) 05:52:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x6000000000000000}, 0x0) 05:52:52 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6c000000, 0x0) 05:52:52 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:52 executing program 5: 05:52:52 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1a8b5000, 0x1000000}], 0x0) [ 2381.270517][T17372] UBIFS error (pid: 17365): cannot open "ubi!_0x0", error -19 [ 2381.270528][T17365] UBIFS error (pid: 17372): cannot open "ubi!_0x0", error -19 05:52:52 executing program 5: 05:52:52 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x74000000, 0x0) [ 2381.279093][T17372] UBIFS error (pid: 17365): cannot open "ubi!_0x0", error -19 [ 2381.326094][ T3841] UBIFS error (pid: 17372): cannot open "ubi!_0x0", error -19 05:52:52 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x6558000000000000}, 0x0) 05:52:52 executing program 5: [ 2381.521008][T17484] UBIFS error (pid: 17484): cannot open "ubi!_0x0", error -19 [ 2381.523368][T17485] UBIFS error (pid: 17484): cannot open "ubi!_0x0", error -19 [ 2381.535383][ T3841] UBIFS error (pid: 17485): cannot open "ubi!_0x0", error -19 05:52:53 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7a000000, 0x0) [ 2381.632367][ T3841] UBIFS error (pid: 17485): cannot open "ubi!_0x0", error -19 [ 2381.697194][T17561] UBIFS error (pid: 17561): cannot open "ubi!_0x0", error -19 [ 2381.701035][ T3841] UBIFS error (pid: 17561): cannot open "ubi!_0x0", error -19 [ 2381.742201][ C0] net_ratelimit: 16 callbacks suppressed [ 2381.742215][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2381.754349][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2381.761389][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2381.767684][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2381.774172][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2381.780384][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:53 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, 0x0, 0x0) 05:52:53 executing program 5: 05:52:53 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:53 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x8cffffff, 0x0) 05:52:53 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8100000000000000}, 0x0) 05:52:53 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1a965000, 0x1000000}], 0x0) 05:52:53 executing program 5: [ 2382.157008][T17600] UBIFS error (pid: 17600): cannot open "ubi!_0x0", error -19 05:52:53 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xc0ed0000, 0x0) 05:52:53 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2382.163243][ T3841] UBIFS error (pid: 17600): cannot open "ubi!_0x0", error -19 05:52:53 executing program 5: [ 2382.348673][T17717] UBIFS error (pid: 17717): cannot open "ubi!_0x0", error -19 [ 2382.356800][T17719] UBIFS error (pid: 17717): cannot open "ubi!_0x0", error -19 [ 2382.367361][ T3841] UBIFS error (pid: 17719): cannot open "ubi!_0x0", error -19 05:52:53 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:53 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf6ffffff, 0x0) [ 2382.425161][ T3841] UBIFS error (pid: 17719): cannot open "ubi!_0x0", error -19 [ 2382.568108][T17727] UBIFS error (pid: 17727): cannot open "ubi!_0x0", error -19 [ 2382.573864][ T3841] UBIFS error (pid: 17727): cannot open "ubi!_0x0", error -19 05:52:54 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, 0x0, 0x0) 05:52:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) 05:52:54 executing program 5: 05:52:54 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf9fdffff, 0x0) 05:52:54 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:54 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1a9f7000, 0x1000000}], 0x0) 05:52:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x20081, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000340)={{0x7e, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x3, 'sh\x00', 0x13, 0x80000001, 0x28}, {@local, 0x4e21, 0x6, 0x3cf0, 0x8, 0x80000001}}, 0x44) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f0000000040)="b25ef342c8e017e7559329a1557fe627bec17b7ea59e849d26b876f5dfdf1c84d18f95b801cd0953fb643f2c4fd6d00d90cf58a4bdc57697ea852c6f58f1e3c4f87e2fd2e8f139757622d838560118ca619448d9fb7913f0d0eeb80ae99c2ca243d43752943b7dd6cfd450bfbc4a9de132b0b953b6447aefc73f03c109c26b46963cd0ccf3698973cb198c8764c3c90cde4314529227cb5d90516f67176b5905938a13611943823d63986dc43b6d204359e7971b4839c02052b87fa4a5d004b61491300e294f134a8b65ae475460e4e148b94ab7ac8608e55a7c21608955b85e3575c7f20d31", &(0x7f00000002c0)=""/73}, 0x18) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000006140), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000040)}, 0x10) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 2383.047696][T17748] UBIFS error (pid: 17748): cannot open "ubi!_0x0", error -19 05:52:54 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfeffffff, 0x0) [ 2383.053911][ T3841] UBIFS error (pid: 17748): cannot open "ubi!_0x0", error -19 05:52:54 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:54 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfffff000, 0x0) 05:52:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xc3ffffff00000000}, 0x0) [ 2383.299668][T17905] UBIFS error (pid: 17905): cannot open "ubi!_0x0", error -19 [ 2383.307085][ T3841] UBIFS error (pid: 17905): cannot open "ubi!_0x0", error -19 05:52:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x2080, 0x4) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f00000000c0)=0x3ff, 0x4) [ 2383.580622][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2383.586457][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:52:55 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, 0x0, 0x0) 05:52:55 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:55 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfffffdf9, 0x0) 05:52:55 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1aad7000, 0x1000000}], 0x0) 05:52:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2203, 0x0) ioctl$TIOCMGET(r4, 0x5415, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r6, 0x200001a0, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) 05:52:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xfcffffff00000000}, 0x0) [ 2383.932892][T18186] UBIFS error (pid: 18186): cannot open "ubi!_0x0", error -19 05:52:55 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2383.936485][ C0] UBIFS error (pid: 18186): cannot open "ubi!_0x0", error -19 [ 2383.980449][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2383.993762][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:52:55 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xffffff8c, 0x0) [ 2384.086077][T18343] UBIFS error (pid: 18343): cannot open "ubi!_0x0", error -19 05:52:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xfeffffff00000000}, 0x0) 05:52:55 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:55 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfffffff6, 0x0) [ 2384.103141][ T3841] UBIFS error (pid: 18343): cannot open "ubi!_0x0", error -19 05:52:55 executing program 5: syz_emit_ethernet(0x354, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c2000000910030008100390086dd60d8652b00140600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5092000090780000f59660f375f1f5239914d89b8abce78567aa0e841896c63624913457ac351db884b5440bb0391957bba841c1cf909c128e74787e12dd9c4361ad366612f6ebfe590933fc44a9e11a3e1ec5ee5140aa696c993350984503a07b8e4bcabb13533435f8"], 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3}) syz_emit_ethernet(0x98, &(0x7f0000000180)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [], {@mpls_mc={0x8848, {[{0xb2, 0x7f, 0x5, 0x1ff}, {0x3, 0x4, 0x938, 0x6}, {0x100000001, 0x57, 0x4f02, 0x1}, {0x7fff, 0x4819490b, 0xffffffff7fffffff, 0x7}, {0x400, 0x3f9, 0x9, 0x5}, {0x9, 0x8, 0x0, 0xff}, {0x7, 0x800, 0x2, 0x3ff}, {0x2, 0x0, 0x3, 0x4}], @generic="a8a9f806c389ba4ae47e209b872a107a8784213560c74962b39cf31ff393302315a5d186fdd848663c29964ff8f1f36b9af79271522c47084244357638a4deaf41113deaf3ad2238da8dc86e34bf019351ba7364155a4f26f377ef595bfb66ec1268222a229352f97350"}}}}, 0x0) [ 2384.296818][T18456] UBIFS error (pid: 18456): cannot open "ubi!_0x0", error -19 [ 2384.302619][ T3841] UBIFS error (pid: 18456): cannot open "ubi!_0x0", error -19 05:52:56 executing program 5: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:56 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfffffffe, 0x0) 05:52:56 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xff00000000000000}, 0x0) 05:52:56 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1ab15000, 0x1000000}], 0x0) 05:52:56 executing program 4 (fault-call:10 fault-nth:0): r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2384.841475][T18631] UBIFS error (pid: 18631): cannot open "ubi!_0x0", error -19 [ 2384.842119][T18636] UBIFS error (pid: 18631): cannot open "ubi!_0x0", error -19 05:52:56 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xedc000000000, 0x0) 05:52:56 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r1, &(0x7f0000001600)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x0) ioctl(r0, 0x0, &(0x7f0000000b80)="02") socket$pptp(0x18, 0x1, 0x2) unshare(0x60000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x20040) sendmsg$NBD_CMD_RECONFIGURE(r3, 0x0, 0x200488d2) socketpair(0x0, 0x6, 0x0, 0x0) r4 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCSFLAGS1(r4, 0x40047459, &(0x7f0000000100)=0x240004) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r5, 0x4040ae72, &(0x7f0000000080)={0x1, 0xbf2, 0x5, 0x6, 0x8}) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000001500)) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000014c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000280)={0x0, 0x8, 0x1, 0x0, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000001580)=@assoc_value={r6, 0x35}, &(0x7f0000000940)=0xdf) r7 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r7, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001340)=""/158, 0x9e}], 0x3, &(0x7f0000000240)=""/35, 0x23}}, {{&(0x7f00000019c0)=@nl, 0x80, &(0x7f0000001ac0)}}], 0x2, 0x0, 0x0) r8 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r8, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) 05:52:56 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2384.859310][ T3841] UBIFS error (pid: 18636): cannot open "ubi!_0x0", error -19 05:52:56 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:56 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf0ffffffffffff, 0x0) 05:52:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 2385.142194][T18749] UBIFS error (pid: 18749): cannot open "ubi!_0x0", error -19 [ 2385.150059][T18748] UBIFS error (pid: 18749): cannot open "ubi!_0x0", error -19 [ 2385.155315][T18748] IPVS: ftp: loaded support on port[0] = 21 05:52:56 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:56 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x100000000000000, 0x0) [ 2385.380772][T18748] UBIFS error (pid: 18907): cannot open "ubi!_0x0", error -19 [ 2385.387613][ T3841] UBIFS error (pid: 18907): cannot open "ubi!_0x0", error -19 05:52:56 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) sendmmsg$unix(r1, 0xfffffffffffffffd, 0x0, 0x8084) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) 05:52:57 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1ab20000, 0x1000000}], 0x0) 05:52:57 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:57 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x200000000000000, 0x0) 05:52:57 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1ab15000, 0x1000000}], 0x0) 05:52:57 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x300000000000000, 0x0) 05:52:57 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1ab15000, 0x1000000}], 0x0) [ 2385.741629][T19080] UBIFS error (pid: 19080): cannot open "ubi!_0x0", error -19 [ 2385.742470][T31516] UBIFS error (pid: 19080): cannot open "ubi!_0x0", error -19 05:52:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:52:57 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000080)={0x14000000, 0x3, 0x3d}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f00000000c0)={0x1, 0xfffffffffffffff8, 0x8001, 0x1, 0xa, 0x10000, 0x0, 0x7fffffff, 0x5, 0x8, 0x400, 0x7}) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000540)={0x3, {0x9, 0x6, 0x5ec6, 0x7f}, {0x6, 0x400, 0x3, 0x4}, {0x7e20, 0x8}}) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e22, 0x9, @ipv4={[], [], @multicast1}, 0x1}, 0x1c) ftruncate(r2, 0x10099b7) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000002c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, 0xff, 0xfffffffffffffff8, 0x7f, 0x100, 0x4, 0x2, r3}) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:57 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:57 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1ab15000, 0x1000000}], 0x0) [ 2386.023391][T19151] UBIFS error (pid: 19151): cannot open "ubi!_0x0", error -19 [ 2386.033288][T31516] UBIFS error (pid: 19151): cannot open "ubi!_0x0", error -19 05:52:57 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x400000000000000, 0x0) 05:52:57 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2386.291652][T19208] UBIFS error (pid: 19208): cannot open "ubi!_0x0", error -19 [ 2386.292405][ T3841] UBIFS error (pid: 19208): cannot open "ubi!_0x0", error -19 05:52:57 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1abfa000, 0x1000000}], 0x0) 05:52:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:52:57 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0x9d, "bee3e95d873008f30a1d7df08696a9646f910d336ef0311aefd4847a66902631b9a38d18ce5713a5845a8e4dd8966d0f9d98563e5ec0d5655a5bfb9f511cea79bcb599188b0b4973e49a51b4b77bdcc7c6396eb0cd38db74920e3c6f80b6d828f3dda8cf403bc1e2844dd7301f530579a8f938da5ce8a70ccf24612d0fefcad93de02b2cd0c1eeebe5fe95e37340fdab8c9b31d6783ca4f8be7174a348"}, &(0x7f0000000400)=0xa5) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r1, 0x2}, 0x8) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x1) syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x0, 0x208100) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x60a091190617fa73, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x102010, r3, 0x0) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000280)='syz1\x00') inotify_add_watch(0xffffffffffffffff, 0x0, 0x3fffffe) r4 = accept4(0xffffffffffffffff, &(0x7f00000001c0)=@un=@abs, &(0x7f0000000180)=0x80, 0x80000) getpeername$netlink(r4, &(0x7f00000000c0), &(0x7f0000000240)=0x2) setsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000100)={{0x6}, 0x0, 0x3, 0x800, {0xe8, 0xffff}, 0x800, 0x1}) 05:52:57 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0e741f07d191bf4c4833b088643f400c4427c54b69b86d"], 0x1}}, 0x4c080) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000680)={@local, @ipv4={[], [], @remote}, @rand_addr="2bde7d6535f0d8fb0139b2b3a0189f73", 0x9, 0x8, 0x7, 0x500, 0xa8, 0x4, r2}) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000440)={{0x3, 0x7, 0xffffffff, 0x6, 'syz1\x00', 0xfffffffffffffe00}, 0x0, 0x200, 0x7, r3, 0xa, 0x3ff, 'syz1\x00', &(0x7f0000000080)=['eth0GPL,&\x00', '*\x00', '*\x00', 'em0bdevvboxnet1\x00', '\x00', '&/\x00', 'wlan0%em1:\x00', '[proc]\x00', '\x00', '%\x00'], 0x37, [], [0x3ff, 0x1, 0x7, 0x50000000000]}) r4 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000700)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645b02c22d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd490900000000000000b5293427c6123c0522dced3ced02f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78090056cd6b162bbbd48435df9b5f8d78882628f83cee06160f10def3f316e7fda193e30803a5e785445d30ec6d3625389a84c9ca7ba666d08c93ebbdff13a31ede67bc1b465fe6dcbac981997e573085426d3dd67769e940ce753f174cb952a7fa9f460abe3b"], 0x80) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f00000000c0)) ftruncate(r4, 0x10099b7) sendfile(r0, r4, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:57 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x500000000000000, 0x0) 05:52:57 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2386.487449][T19219] UBIFS error (pid: 19219): cannot open "ubi!_0x0", error -19 05:52:57 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:57 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x600000000000000, 0x0) [ 2386.489409][ T3841] UBIFS error (pid: 19219): cannot open "ubi!_0x0", error -19 05:52:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101200, 0x0) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x804, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2000, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:52:58 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x700000000000000, 0x0) [ 2386.731103][T19416] UBIFS error (pid: 19416): cannot open "ubi!_0x0", error -19 [ 2386.733569][ T3841] UBIFS error (pid: 19416): cannot open "ubi!_0x0", error -19 05:52:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:52:58 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x2000004e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800000000000}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3f5fb6b6bea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07d8572ef732620404c453b67a7d44b0218e7c18442bfc807f6d24e9bd917875fed099c9caef57811729f0cb6e9716813cd7d78edbca707824f35d06b9568aba03332ef075187d9fe3ca27b6ff0bfc6a8258442d80da772c9b6278c7be9e539de6c797c4c8d4133b13204b"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:58 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1ac21000, 0x1000000}], 0x0) 05:52:58 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:58 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1f00000000000000, 0x0) 05:52:58 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000080)) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x8) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) fsync(r0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x1fe) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) clock_gettime(0x0, &(0x7f00000033c0)={0x0, 0x0}) lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000003440)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000003640)={0x0, 0x4c, &(0x7f00000035c0)=[@in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e21, 0x2, @ipv4={[], [], @empty}, 0x8}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000003680)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000036c0)={r5, 0x2}, &(0x7f0000003700)=0x8) recvmmsg(r0, &(0x7f0000003240)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/8, 0x8}], 0x1, &(0x7f0000000280)=""/168, 0xa8}, 0x80}, {{&(0x7f00000001c0)=@ax25={{0x3, @netrom}, [@bcast, @rose, @null, @null, @bcast, @bcast, @rose, @rose]}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000340)=""/183, 0xb7}, {&(0x7f0000000400)=""/236, 0xec}], 0x2, &(0x7f0000000540)=""/17, 0x11}, 0x4}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000580)=""/127, 0x7f}, {&(0x7f0000000600)=""/77, 0x4d}, {&(0x7f0000000680)=""/7, 0x7}, {&(0x7f00000006c0)=""/178, 0xb2}, {&(0x7f0000000780)=""/252, 0xfc}], 0x5, &(0x7f0000000900)=""/217, 0xd9}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a00)=""/108, 0x6c}, {&(0x7f0000000a80)=""/229, 0xe5}], 0x2, &(0x7f0000000bc0)=""/4096, 0x1000}, 0x8001}, {{&(0x7f0000001bc0)=@hci, 0x80, &(0x7f0000001c40), 0x0, &(0x7f0000001c80)=""/101, 0x65}, 0xf64}, {{&(0x7f0000001d00)=@nfc, 0x80, &(0x7f0000003100)=[{&(0x7f0000001d80)=""/84, 0x54}, {&(0x7f0000001e00)=""/164, 0xa4}, {&(0x7f0000001ec0)=""/159, 0x9f}, {&(0x7f0000001f80)=""/4096, 0x1000}, {&(0x7f0000002f80)=""/150, 0x96}, {&(0x7f0000003040)=""/93, 0x5d}, {&(0x7f00000030c0)=""/3, 0x3}], 0x7, &(0x7f0000003180)=""/142, 0x8e}, 0x2}], 0x6, 0x40000000, &(0x7f0000003400)={r3, r4+10000000}) socket$nl_crypto(0x10, 0x3, 0x15) sendto$rose(r2, &(0x7f00000034c0)="2f6ffa6b88ec1376c23a2dd4b660ff8faf067b633e2e3f261f8d2324c65178e6de629d774646725811c137192cf22cd942d706b93410afaaf89891e96b49ccc7a96c82b81c758a41bdbbeec6a2edfcb831abfe08ffa4b7af631a82682cd18046515ca6cea3262777b428e1ce690d58efb63ca0389e2b12d26284ef3e89470993150e9ba321765fe7aae676ffeae7c8e391640977f0", 0x95, 0x1, &(0x7f0000000080)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @default}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r1, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000003580)='/dev/nullb0\x00', 0x201, 0x0) 05:52:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2387.348764][T19663] UBIFS error (pid: 19663): cannot open "ubi!_0x0", error -19 05:52:58 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1f26000000000000, 0x0) [ 2387.350906][ T3841] UBIFS error (pid: 19663): cannot open "ubi!_0x0", error -19 05:52:58 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:58 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000080)=r2) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:59 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2000000000000000, 0x0) [ 2387.584709][T19862] UBIFS error (pid: 19862): cannot open "ubi!_0x0", error -19 05:52:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x80, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810fe00f80ecdb0548e519e765000500d4120300120009000600da1b40d819a918001500f9000000", 0x2e}], 0x1}, 0x0) 05:52:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2387.585384][ T3841] UBIFS error (pid: 19862): cannot open "ubi!_0x0", error -19 05:52:59 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1aca1000, 0x1000000}], 0x0) 05:52:59 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2387.738539][ C1] net_ratelimit: 18 callbacks suppressed [ 2387.738548][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2387.750135][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2387.787415][T19886] netlink: 'syz-executor5': attribute type 6 has an invalid length. 05:52:59 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2010000000000000, 0x0) [ 2387.845446][T19934] UBIFS error (pid: 19934): cannot open "ubi!_0x0", error -19 [ 2387.846314][ T3841] UBIFS error (pid: 19934): cannot open "ubi!_0x0", error -19 05:52:59 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e1c, 0x0, @loopback, 0xffffffffffffffff}, 0x17) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000000c0)={0x421}, 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000080)=0x400000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) connect$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:59 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000180)=ANY=[@ANYBLOB="020000000000000002005de66afc363c1dc0838d12d9da3000000000000004000000008000000300000006000000060000000000000000000000000000000000008009000000010000000100000000800000ffff00000400"]) connect$unix(r3, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000280)=0x3, &(0x7f00000002c0)=0x2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0xc08c5336, &(0x7f0000000040)={0x0, @time}) [ 2387.978469][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2387.984279][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2387.990141][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2387.995950][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2388.001802][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2388.007572][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2388.051550][T20101] UBIFS error (pid: 20101): cannot open "ubi!_0x0", error -19 [ 2388.052170][ T3841] UBIFS error (pid: 20101): cannot open "ubi!_0x0", error -19 05:52:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:52:59 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3f00000000000000, 0x0) 05:52:59 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f00000001c0)=0xe2f) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="19d0cc2e15d03d68d038931ca7e3a78bf720e94f462430bdc3b8c2e025620f346685f86cb7ce4b62cec593bc1f8306e1a12689341a1622f8d576456a10468b1541f8dc7ed286905c945554dfc2cbeb6b6804a5c1b41dd840be285a29a28c1921e8424cc2cb46ea63c43d48eb9f4eecda"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f00000000c0)={0x0, 0x0, 0x0, [], &(0x7f0000000080)=0x313}) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:59 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:59 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1acab000, 0x1000000}], 0x0) [ 2388.218349][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2388.224235][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:52:59 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4800000000000000, 0x0) [ 2388.335933][T20267] UBIFS error (pid: 20267): cannot open "ubi!_0x0", error -19 [ 2388.339355][ T3841] UBIFS error (pid: 20267): cannot open "ubi!_0x0", error -19 05:52:59 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:52:59 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101200, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000040)={0x16, "62d1052358103a239d980efd5de2d8930c675ef1291a"}) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000080)={'veth1_to_bridge\x00', @ifru_map}) 05:52:59 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:52:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:52:59 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4c00000000000000, 0x0) [ 2388.562012][T20329] UBIFS error (pid: 20329): cannot open "ubi!_0x0", error -19 [ 2388.581069][ T3841] UBIFS error (pid: 20329): cannot open "ubi!_0x0", error -19 05:53:00 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1acba000, 0x1000000}], 0x0) 05:53:00 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:00 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6800000000000000, 0x0) 05:53:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x103000, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r3, 0x320, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x814}, 0x80) r4 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) r5 = getpgid(0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffff9c, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r5, r6, 0x0, 0x8, &(0x7f0000000180)='\\system\x00', r7}, 0x30) setsockopt$TIPC_DEST_DROPPABLE(r6, 0x10f, 0x81, &(0x7f0000000340)=0x80000000, 0x4) bind$alg(r6, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(sm4)\x00'}, 0x58) [ 2388.839293][T20550] UBIFS error (pid: 20550): cannot open "ubi!_0x0", error -19 [ 2388.840049][ T3841] UBIFS error (pid: 20550): cannot open "ubi!_0x0", error -19 05:53:00 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:00 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:00 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6c00000000000000, 0x0) 05:53:00 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @window={0x3, 0x4, 0x9}, @timestamp, @mss={0x2, 0x649}, @timestamp], 0xa) acct(0x0) 05:53:00 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1adfd000, 0x1000000}], 0x0) [ 2389.048233][T20586] UBIFS error (pid: 20586): cannot open "ubi!_0x0", error -19 05:53:00 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7400000000000000, 0x0) [ 2389.077727][ T3841] UBIFS error (pid: 20586): cannot open "ubi!_0x0", error -19 05:53:00 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:00 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000000)={0xfffffffffffffdda, 0x20000000, 0x5000, 0x8, 0x1ff, 0x7ff, 0x8, 0x4, 0x7ff, 0x7f}, 0x10) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'nr0\x00'}) modify_ldt$write2(0x11, &(0x7f0000000140)={0x7f, 0x0, 0xffffffffffffffff, 0xfffffffffffffff7, 0x80000001, 0x6, 0x5, 0x1, 0x9, 0x200}, 0x10) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000200)="577d37363955145879a5d2daf10c8bab5560fa2b238ac3e95870c6c7ca3c32087230975b14d60bfc798b6c3c4e306a30e96ad8afd13dd7229e446e2435715fc2d2fa3207c677b8febce0a13c80461b29f71f945643451d1c5b1415eb61e452fd769626d3790cd47827dce288b725b46082ad", 0x72}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="fabc819c76c59256f9b35a4ce49ec4fe5a80a11082769dc662eda3a957ed23a9bc3c4d84f6eeb9baa4fb98ed786054a25649bb53f8db624db4f4dcd03ec318", 0x3f}], 0x3, &(0x7f0000000500)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x20, 0x4040000}, 0x891) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000580)=0xca9, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0x10000, {}, 0x1, 0x6}) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000640)={0x7b, 0x0, [0xf94f, 0x3, 0x5, 0xfff]}) ioctl$int_in(r0, 0x5473, &(0x7f00000006c0)=0x454) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000700)={0x1a, "abaa9da94eadbcf5352b1e23cc4c96e5acc7dc99b12f93edecc5f9a1a2f20045467e51fdf5bb26c09ce6184ee6b38849a027ff15d282bd24d2c461362a974188a673cdc67ab72cd86b3777dfecc264c6f1b1ed0c4d8861587e9e567833088008ae9b0a573009115feccda0b67d89a33fa12340f2a67cc6f3737dc48b35c7c34c"}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000007c0)={0x0, 0x10000}, &(0x7f0000000800)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000840)={r4, 0x1}, 0x8) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000880)=0x1000) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0xeb63) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000008c0)={r4, 0x8000}, &(0x7f0000000900)=0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000009c0)={0x5, 0x2, 0x3, 0x5, &(0x7f0000000940)=[{}, {}]}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000a40)={r0, r0}) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000a80)={0x1000, 0x3, 0x800, 0x0, 0x8}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000ac0)={r5, 0x5}, &(0x7f0000000b00)=0x8) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000cc0)={0x3, 0xce, &(0x7f0000000bc0)="4330ad72e662ccec4c5f08b1b1aa22e2626b66196a2d4c978e46e9aee2c94aea62367f2f3160b0c414c64d9832401a43562ed13430c89f9fd3d2926335e25f91db5100865e5ea61c20367c59914a6ba6d3a7a50700fde03fbacba5cf5856f7eade90bbc1df1c0d501bec9d4cd7379377a3cdd435320f081f4577867babe324b1679cc25520051a42dc8d135372a6e1f7cade408b06876ef10a7073100bca026ed98c2ffb2c1b7a180079e771a68031e88ef775a816259b8f8cde061f226e556db1de1217aa9b5513da5d69f7e499"}) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000d00)=@assoc_value={r6, 0xf4}, 0x8) pipe2(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$netrom_NETROM_T4(r7, 0x103, 0x6, &(0x7f0000000d80)=0x10000, 0x4) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000dc0)) 05:53:00 executing program 4: r0 = socket$inet6(0xa, 0x5, 0xfffffffffffffffd) write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0/file0', [{0x20, '/,*vmnet1trustedvmnet0posix_acl_accessuser,'}, {0x20, '%keyring'}, {}], 0xa, "7e4e1e78c30a30a00586e8d34f24ca19f958eaa500a081ef0a177121ecbbd7c49b9332882e82ac61e9f0a75a0adf41b68dc3959ad5fd6d618e2b4fdac55ea2d0a08ddf78e0305f7ab7beca25ec924678fe313e5a7bbed6a4c769bd4efdee295d0bf6c162aec7b9fad60cc2a45457d245e44599b3c51536d81bfc34cd05e46ca4898a04ad748689bd9cce4342eb461837412c45340a9d5e1efcbbbcbf99cf06e5c6308774ec106f29316bf6b57617f807231c4e3f419e8783d70cbd038307a47fdca6586219b47073a2dcad9d6e4dae"}, 0x116) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000001c0)={0x9, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f00000005c0)={r3, 0x2, &(0x7f00000002c0)=[0x8, 0x0], &(0x7f0000000300)=[0x101, 0xda, 0x47c, 0xfff], 0x2, 0x2, 0x5, &(0x7f0000000340)=[0x0, 0x3], &(0x7f0000000580)=[0x3, 0x1, 0x6, 0x2, 0x7, 0x100000001, 0x7]}) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:00 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:00 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7a00000000000000, 0x0) [ 2389.351143][T20778] UBIFS error (pid: 20778): cannot open "ubi!_0x0", error -19 [ 2389.351805][ T3841] UBIFS error (pid: 20778): cannot open "ubi!_0x0", error -19 05:53:00 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:00 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x8cffffff00000000, 0x0) 05:53:00 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1adff000, 0x1000000}], 0x0) 05:53:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="63f5c91d7c1f8b89ce3f1851b6da56c5dcfb3ad77491c0a27e786140966ca02df9044c7af236a1305c4b6a291083bbef43953afa1037a9e7fdd4e964b7107f004486f0d7d528a3a38b0c9a97bb7725000000000000000000000000000000"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r1 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r1, 0x10099b7) sendfile(r0, r1, 0x0, 0x88000fbfffffc) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, 0x6e) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000300)={@mcast2}, 0x14) 05:53:01 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = dup(r0) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000140)={0x9, {{0x2, 0x4e22, @local}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xfffffffffffffff9}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2, 0x5}, 0x8) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="040100001a0005020000000000000000ff0100000000000000000000000000017f00000100000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb000000000000000000000000050000003c000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000014000e00fe800000000000000000000000000000fd"], 0x104}}, 0x0) 05:53:01 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf6ffffff00000000, 0x0) [ 2389.634132][T20996] UBIFS error (pid: 20996): cannot open "ubi!_0x0", error -19 [ 2389.634881][ T3841] UBIFS error (pid: 20996): cannot open "ubi!_0x0", error -19 05:53:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:01 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2389.783027][T21005] mip6: mip6_destopt_init_state: spi is not 0: 5 05:53:01 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf9fdffff00000000, 0x0) 05:53:01 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1aefe000, 0x1000000}], 0x0) [ 2389.924613][T21177] UBIFS error (pid: 21177): cannot open "ubi!_0x0", error -19 05:53:01 executing program 5: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2389.926873][ T3841] UBIFS error (pid: 21177): cannot open "ubi!_0x0", error -19 05:53:01 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:01 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfeffffff00000000, 0x0) [ 2390.190278][T21255] UBIFS error (pid: 21255): cannot open "ubi!_0x0", error -19 [ 2390.191072][T21277] UBIFS error (pid: 21255): cannot open "ubi!_0x0", error -19 05:53:01 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2390.210769][ T3841] UBIFS error (pid: 21277): cannot open "ubi!_0x0", error -19 [ 2390.345779][T21336] UBIFS error (pid: 21336): cannot open "ubi!_0x0", error -19 [ 2390.349023][ T3841] UBIFS error (pid: 21336): cannot open "ubi!_0x0", error -19 05:53:01 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x20000, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000080)=0x8, 0x4) sysfs$2(0x2, 0x101, &(0x7f0000000040)=""/28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_int(r0, 0x11, 0xb, &(0x7f00006ed000), &(0x7f0000000000)=0x4) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000140)=0x14) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@initdev}}, &(0x7f00000002c0)=0xe8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fe9000/0x10000)=nil, &(0x7f0000fe9000/0x3000)=nil, &(0x7f0000feb000/0x4000)=nil, &(0x7f00000003c0)="e884586ec57a3865828d032b213bb22a0a3bf757618041b2b8b114ff03148e5226ac4521d485bbba6dd7c8979e799c3d3d9397b4df6bc37312bae72a23c35ca42d95c66a6bd45359a12f2917308dd399a5ada48f", 0x54, r2}, 0x68) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000380)={r4, r5, r6}, 0xc) socket$inet6_sctp(0xa, 0x1, 0x84) 05:53:01 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xffffffff00000000, 0x0) 05:53:01 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1aff8000, 0x1000000}], 0x0) 05:53:01 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 05:53:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2390.586686][T21348] UBIFS error (pid: 21348): cannot open "ubi!_0x0", error -19 05:53:02 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfffffffffffff000, 0x0) 05:53:02 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2, 0x0) [ 2390.610410][ T3841] UBIFS error (pid: 21348): cannot open "ubi!_0x0", error -19 05:53:02 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) 05:53:02 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:02 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) [ 2390.878748][T21559] UBIFS error (pid: 21559): cannot open "ubi!_0x0", error -19 [ 2390.881980][ T3841] UBIFS error (pid: 21559): cannot open "ubi!_0x0", error -19 05:53:02 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000040)='.', &(0x7f0000000080)='ubifs\x00', 0x0, 0x0) 05:53:02 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3, 0x0) [ 2391.064334][T21599] UBIFS error (pid: 21599): cannot open "ubi!_0x0", error -19 [ 2391.116068][T21656] UBIFS error (pid: 21599): cannot open "ubi!_0x0", error -19 05:53:02 executing program 3: mount(&(0x7f0000000140)=@nullb='/dev/nullb0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$caif_stream(0x25, 0x1, 0x3) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0xfffffffffffff84e, 0x8}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x1, 0x0) connect$bt_rfcomm(r2, &(0x7f0000000080)={0x1f, {0x6b, 0x8, 0x1, 0x0, 0x1, 0x9}, 0x6}, 0xa) [ 2391.157439][ T3841] UBIFS error (pid: 21656): cannot open "ubi!_0x0", error -19 [ 2391.283184][ T3841] UBIFS error (pid: 21656): cannot open "ubi!_0x0", error -19 05:53:02 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1b000000, 0x1000000}], 0x0) 05:53:02 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000080)="2f64228db4476902d4eec6ff18d2d21d6e485f7472fcbde4b13e200f4c58d2f62ac126410525ecbc4ad4578d00d0edace3448078ef7327f9308abffc"}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) r3 = dup(0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000002980)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x6e05e4655aa31e92) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000480)=@int=0x6, 0x4) sendmsg$tipc(r4, &(0x7f0000002840)={&(0x7f0000002880)=@nameseq={0x1e, 0x1, 0x3, {0x42, 0x4}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40002}, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/vga_arbiter\x00', 0x40000, 0x0) r6 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) r7 = dup(r6) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000002c0)={0xffffffffffff2287, 0x0, 0x5, 0x0, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000340)={r8, 0xea2a}, &(0x7f0000000440)=0x8) ioctl$SCSI_IOCTL_GET_PCI(r7, 0x4008550d, &(0x7f0000000040)) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:02 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4, 0x0) 05:53:02 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2391.377809][T21713] UBIFS error (pid: 21713): cannot open "/dev/nullb0", error -22 [ 2391.383264][T21725] UBIFS error (pid: 21713): cannot open "/dev/nullb0", error -22 [ 2391.395296][T21725] UBIFS error (pid: 21725): cannot open "ubi!_0x0", error -19 05:53:02 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x5, 0x0) 05:53:03 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) [ 2391.457993][ T3841] UBIFS error (pid: 21725): cannot open "ubi!_0x0", error -19 05:53:03 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2391.663156][T21997] UBIFS error (pid: 21997): cannot open "ubi!_0x0", error -19 [ 2391.665627][T21694] UBIFS error (pid: 21997): cannot open "ubi!_0x0", error -19 05:53:03 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f00000000c0)='.', &(0x7f0000000080)='ubifs\x00', 0x0, 0x0) 05:53:03 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fsync(r1) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a16171e7b16539f3369bf21e18e598ded9235d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd49009333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c0704f7450ad49eda67450bce8af526e9ac67556587375e9a24502e8519bfa63a51efd8935d370826741987c3b95085006245f0b994ce8d9d3a7fdcb7ed7baabb187aec165de90ff49e57ac3e4beac491b2dd0f4207bfa02aaa938e1271371a215f74885489474761983e2ce8d26a8a9f98d44f24e1a5f8a7bff0c3"], 0x80) syz_read_part_table(0x1f, 0x5, &(0x7f0000000600)=[{&(0x7f0000000080)="e1159593bffbbc27ffd5c7de1347526c18e9e464e81d94252fec5bab5c180a0a093fde95c58ad1ee2ceccd0351c67d9a3590af3458a7a412e3b3b730b3ba00832061c79a", 0x44, 0x400}, {&(0x7f00000002c0)="d4377a7e9a2fa061e4f741a1b2c1a1a394a8271c6fc6e4e478d1aead9988ed628c8a925aecab3066f48ba22ede51cfad28e34b43d4473d9ff8bb26d0e0b1cad03437c12ec76ffe2938373c", 0x4b, 0x7}, {&(0x7f0000000440)="f4c83c67320862f441c169e38ec6883828b391cd5a5a4de54eb0535423261ac4eb0f550dfa18bfe4de4c158cc73a75eb8cb54d9b1e2519cd0e66d92ff9a3a807cc01c59de24f25a753f50ed08fce176038b87df9d843644a4ee02f3626f6526e6fbaaff6c1a3fc1d630c63e25ea6fb0c2f57b354337e4786e3fa90067c5aca812624d7946636162e44d5cebf715412c31404fe9f77af80795a079070f0c125f6b288be0655a0a4d862de01858b2a5711098251d8e31dfb660fa0bcf1b0f29ebbb5f6025cee3965c6398d010a3c5a7d2d1fbb8e8aa3b3", 0xd6, 0x8}, {&(0x7f00000001c0)="16c201787740c0e01ea66dd148329236b810", 0x12, 0x2}, {&(0x7f0000000540)="9c3c73dc182e18dee36b75c5fdf6c846094911d0113a7b99dfa33164c6ae1640c28981987111fccaf6ed5ab667d8375c2f3cab4ec9262641956224608251cbdecafe04ed986d5fbe653712cdba7287db70ed259c66a91da687ed8844f138c4dc80b0674f86006f633fb97106cd5156e5bc5ad5c6a849b65326ea9dca93baccdd4641be6276265b39288450dbed5c9f8e6b5219af4cfddf893899716a51381a95a5b38ca3d7603f5d1ed3696b8b87a8", 0xaf, 0x4}]) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:03 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6, 0x0) 05:53:03 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1d781000, 0x1000000}], 0x0) [ 2391.880583][T22063] UBIFS error (pid: 22063): cannot open "ubi!_0x0", error -19 [ 2391.882555][T22106] UBIFS error (pid: 22063): cannot open "ubi!_0x0", error -19 05:53:03 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7, 0x0) [ 2391.890484][T22106] UBIFS error (pid: 22106): cannot open "ubi!_0x0", error -19 [ 2391.996688][ T3841] UBIFS error (pid: 22106): cannot open "ubi!_0x0", error -19 05:53:03 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:03 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mknod(&(0x7f00000000c0)='./file0\x00', 0xa, 0x5) quotactl(0x7, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)="2ec30fc937eb895789543c4b0f774377541dc4f4f88265382211b459916316c75cc2575bbc7050396eecd807c2f421841f5f9aa8ad3a0990adb6eaf309fc50215cb83993a978c7d5e76cbb0f455957ec350975c0fc199c8b34174035fff6") [ 2392.141512][T22219] UBIFS error (pid: 22219): cannot open "ubi!_0x0", error -19 [ 2392.146680][ T3841] UBIFS error (pid: 22219): cannot open "ubi!_0x0", error -19 05:53:03 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:03 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 05:53:03 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xc, 0x0) [ 2392.266507][T22244] UBIFS error (pid: 22244): cannot open "ubi!_0x0", error -19 [ 2392.292021][ T3841] UBIFS error (pid: 22244): cannot open "ubi!_0x0", error -19 [ 2392.396045][T22329] UBIFS error (pid: 22329): cannot open "ubi!_0x0", error -19 05:53:03 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:03 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x12, 0x0) [ 2392.398583][ T3841] UBIFS error (pid: 22329): cannot open "ubi!_0x0", error -19 05:53:04 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x20) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2392.644183][T22466] UBIFS error (pid: 22466): cannot open "ubi!_0x0", error -19 05:53:04 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', '\\\x00'}, &(0x7f00000001c0)='}\x00', 0x2, 0x2) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ioctl$UI_DEV_CREATE(r2, 0x5501) ftruncate(r2, 0x7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:04 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x18, 0x0) [ 2392.656390][T22552] UBIFS error (pid: 22466): cannot open "ubi!_0x0", error -19 [ 2392.764128][ T3841] UBIFS error (pid: 22552): cannot open "ubi!_0x0", error -19 [ 2392.847321][ T3841] UBIFS error (pid: 22675): cannot open "ubi!_0x0", error -19 [ 2392.855398][ T3841] UBIFS error (pid: 22675): cannot open "ubi!_0x0", error -19 05:53:04 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1ddfc000, 0x1000000}], 0x0) 05:53:04 executing program 3: mount(&(0x7f0000000080)=ANY=[@ANYBLOB="75667830000000000092f988f571a3cc93864195bcb0c9c867b975290f3c437e0cfa76b0e7d9897250dd862b1538c0f541919a719208da8fed468a3115411b8fc295a1aed086c0607627536d3de151e54bacf578bf9d4de2aefc3b8e7ff8780e5c2240e93d5e39"], &(0x7f0000000380)='.', &(0x7f0000000040)='logfs\x00', 0x0, 0x0) r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000100)={0x0, @reserved}) 05:53:04 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) 05:53:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:04 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1e, 0x0) 05:53:04 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c79b8f2de46a18891c10a00003488403df8a99a73672e56bd5629ed44cb20e0ef385f8477aec169adb3ec7a35e5193107605affc9100b340066f2a5724b63df65bc1ef5ebe4f4ce796b2fab33409d5b391360c3e65b017918578c35fe12"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="90010000", @ANYRES16=r3, @ANYBLOB="01002abd7000fddbdf2514000000200007000c00040003000000000000000800010080000000080002000100200018000200080001000b000000080001000600000004000400280007000c00030001000000000000000800020001000000080001000600000008000100ff000000180002000400040008000100452e652a08000200fc0800000c0006000800010008000000100004000c00010073797a3100000000100002000400040008000200010000001400060004000200080001000800000004000200a000050008000100696200000800010069620000440002000800030004000000080002008100000008000300ff07000008000400bc0000000800040007000000080002000700000008000200030000000800040008000000240002000800020005000000080001001d000000080003000900000008000400030000001c000200080001001900000008000300970000000800040001000000080001007564700024000100100001007564703a73797a3200000000100001007564703a73797a3000000000dc5380a990257a7bb788ff8ea4587fe87ae00128b13df0f3e90fbc35e59eadd94f0a2707517775e96c7c4256b833472c3d7f6d1a376dad4b00f86c239031e7d835193b3566068e59acb18a7fe1f2ee6e11bf"], 0x190}, 0x1, 0x0, 0x0, 0x4000040}, 0x8000) write$P9_RMKNOD(r1, &(0x7f0000000600)={0x14, 0x13, 0x1, {0x20, 0x0, 0x4}}, 0x14) keyctl$set_reqkey_keyring(0xe, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2393.178926][T22757] UBIFS error (pid: 22757): cannot open "ubi!_0x0", error -19 05:53:04 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x24, 0x0) [ 2393.179766][ T3841] UBIFS error (pid: 22757): cannot open "ubi!_0x0", error -19 05:53:04 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000080)={0xa, 0x4e20, 0x1ffffffffffffe, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3549ea714ab19453ff310321dcb46c8e133bb8602a9f527c7675d8694a7b88b3683baf809857dd98180b3015baee85746d7366fbd759c3787f2adcbb51289d6ef10d28baa72b851e9ab03caabf70454ba4c3f8318a43e9bfdb4e79b6e4a310e02ba0373c49a68dffc6cd8fecd4d724d3ec08b352e40aa74c24d3d4e7c4d9e524b5c9dfb9ddca8f230071277ad985c57343536f260000000000000000000000000000000000"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) accept$inet6(r1, 0x0, &(0x7f0000000000)) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) socket$inet(0x2, 0x80a, 0xfffffffffffffff7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:04 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='t!_0x0\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:04 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2a, 0x0) 05:53:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2393.521265][T22981] UBIFS error (pid: 22981): cannot open "t!_0x0", error -22 05:53:05 executing program 3: mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000380)='.', &(0x7f0000000040)='ubifs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') 05:53:05 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1de23000, 0x1000000}], 0x0) 05:53:05 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x30, 0x0) [ 2393.522358][ T3841] UBIFS error (pid: 22981): cannot open "t!_0x0", error -22 [ 2393.702192][T23092] UBIFS error (pid: 23092): cannot open "/dev/md0", error -22 [ 2393.706826][ T3841] UBIFS error (pid: 23092): cannot open "/dev/md0", error -22 05:53:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) 05:53:05 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) r3 = getpgrp(0x0) getpgrp(r3) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:05 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x36, 0x0) 05:53:05 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1, 0x8}, 0x8) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="250400b0a4d0dfeb20"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:05 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2394.018287][ T3841] UBIFS error (pid: 23101): cannot open "%", error -22 05:53:05 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r2 = getegid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010007000000000002000100", @ANYRES32=r0, @ANYBLOB="02020400", @ANYRES32=r1, @ANYBLOB="040007000000000008000300", @ANYRES32=r2, @ANYBLOB="080005004c5190c7f76205a5f86074232b2b7d7cb0951c59895f988d8a3ec4c9b634c4a02498584916b8c6e6dd72a5839d99bc75063c3d29a05a979c3af2a20c5a15c6df7ed088a601b2ae0e2c7201b702a9ad41b401577328daf0ebf27f89f908fc25b920c36798d3a77acd5d7e46fd95417d11491bd08a16ab58b526e04d8185df2fcd2fd9a46138ecf0da8d348d860968255b08490a1a7d9fa44841e2e7f4bb39575edf148b52862a9f26fde8da5b1960122d13b907ec29aca327306b", @ANYRES32=r3, @ANYBLOB="10000400000000002000010000000000"], 0x44, 0x2) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x902, 0x0) bind$tipc(r4, 0x0, 0x0) 05:53:05 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3c, 0x0) [ 2394.215500][ C0] net_ratelimit: 18 callbacks suppressed [ 2394.215616][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2394.227190][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2394.233599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2394.239825][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2394.246076][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2394.252178][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:53:05 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f00000001c0)=[{&(0x7f00000002c0)="f2520d3b06c1408aeb469ffee04330576bca82fa7aa6194c9628da000b4ffea66be6fdb6d47673b65f090d469ebcc9197b8f91a8c4767fb783e8fc0e6ac08da6d231a205c50f1b8eddb64ec659c6ec6389b34bbcb1e5e733363722fd", 0x5c, 0xfffffffffffff3af}], 0x20000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="270822ed1bad80f48d265137baaebe0000a6562b7cc5ac86f3575ac9c98e012899b3802c0d268d548c78ef013d7198c1d099f6d5699d54b76c46cfbbc12203d56fb0698d"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x44d) 05:53:05 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x48, 0x0) 05:53:05 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2394.353960][T23322] UBIFS error (pid: 23318): cannot open "ubi!_0x0", error -19 [ 2394.368606][T23322] UBIFS error (pid: 23322): cannot open "ubi!_0x0", error -19 05:53:05 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1df2a000, 0x1000000}], 0x0) 05:53:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) 05:53:05 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4c, 0x0) [ 2394.377717][ T3841] UBIFS error (pid: 23322): cannot open "ubi!_0x0", error -19 05:53:06 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x80040, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000100)=""/19) [ 2394.558819][T23451] UBIFS error (pid: 23451): cannot open "ubi!_0x0", error -19 05:53:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) [ 2394.560972][ T3841] UBIFS error (pid: 23451): cannot open "ubi!_0x0", error -19 05:53:06 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x68, 0x0) 05:53:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2394.684142][T23538] UBIFS error (pid: 23538): cannot open "ubi!_0x0", error -19 [ 2394.694290][ T3841] UBIFS error (pid: 23538): cannot open "ubi!_0x0", error -19 05:53:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) 05:53:06 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1f524000, 0x1000000}], 0x0) 05:53:06 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000300)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:06 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x208000, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000003c0)={0xffff, 0x9, 0x5, 0xffffffff, 0xa, [{0xfffffffffffffffc, 0x6, 0x3, 0x0, 0x0, 0x2684}, {0x7, 0xb2e, 0xe6, 0x0, 0x0, 0x200}, {0x8, 0x8, 0x8, 0x0, 0x0, 0x80}, {0x200, 0xf7, 0x1, 0x0, 0x0, 0x800}, {0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x800}, {0x2, 0x0, 0x45b4, 0x0, 0x0, 0x1b00}, {0x460e, 0xffffffffe2b9e2c6, 0x5, 0x0, 0x0, 0x2604}, {0x1, 0x5, 0xff, 0x0, 0x0, 0x1e04}, {0x3c, 0x8, 0x9, 0x0, 0x0, 0x88}, {0x3ff, 0xffffffff, 0x9, 0x0, 0x0, 0x1084}]}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000240)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r2, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x200000000000000}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) 05:53:06 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6c, 0x0) 05:53:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) 05:53:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:06 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x20026000, 0x1000000}], 0x0) 05:53:06 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x74, 0x0) [ 2395.269138][T23763] UBIFS error (pid: 23763): cannot open "ubi!_0x0", error -19 05:53:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08fe31761b83ae95074f7dbad0f352e67d7c84c2bf995dc472fd44b7b5484e6603e2414c5f577bb9d99976461ae8bea00589"], 0x1}}, 0x4c080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2395.288177][ T3841] UBIFS error (pid: 23763): cannot open "ubi!_0x0", error -19 05:53:06 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7a, 0x0) 05:53:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:06 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000140)={r1, 0x1, 0x6, @link_local}, 0x10) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x3, r1, 0x1c, 0xffffffffffffff9c}, 0x10) 05:53:06 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2003f000, 0x1000000}], 0x0) [ 2395.567561][T23987] UBIFS error (pid: 23987): cannot open "ubi!_0x0", error -19 05:53:07 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x100) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) iopl(0x554) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0x74, 0x1000, &(0x7f00000002c0)="bf3aa1e0c1534a3669e9cce845aaf312e023be24f620328983f9b5a4d825b54625dbe96d86797a576fd44f9c7ea2274e2fd5271b01f019f1e04a217df92b51c54c3a8b8d70a79c7595542385dab805a67c615402385d1cf8f67f192fd64d6234161bf12c7019a6db3bd3b9d9aa129f3d29e04280", &(0x7f0000000440)=""/4096, 0x8e}, 0x28) 05:53:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:07 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf0, 0x0) 05:53:07 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2395.572160][ T3841] UBIFS error (pid: 23987): cannot open "ubi!_0x0", error -19 05:53:07 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x300, 0x0) 05:53:07 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:07 executing program 3: mount(&(0x7f0000000000)=@md0='/dev/md0\x00', &(0x7f0000000300)='.', &(0x7f0000000180)='^\xfb\x12\xb6\xbfXYc\x8e]\a\xb1\xc0\bx\xf7L6>\x84\xde\xaa\x9f\xc7?r\xdd\xe3\x7f\x1a\x1a\b\xdc1~\xe1\xa9\xec\x1e\xc5\xd3zh\xa7\x9d\xc7\xfa\xcaC\x8c\x95 \x8b\x02f\r\x91\x93\xe1\x88\xe0\xdf\xe9\n\xd7d\x1b\x12\xc8\x83\xb3\x83\xa8\xd71\x8b\xdc\xab\xae\xecx\xd3\xe6AYr\x1d\xb2\x02\xe2\xcd\x88<\xa0Y\xc6\xcd\xe1]\'V\xfc`j\xa2\x8b\x9b\x92\x19t\xd7\xee\a\xe4\x03\xcb^/YU6,K\xb8:H\x8c\xfbv\x9d\xd6?7T\xa9\xb6\xca\xa2\xc3-(\x93\xb2E\xd6\v\x97Dl*z\xde\xae\x0e\x92%yK\x84\xac.\xe2y\xc2\xf8\xd6\xa4\xce;]Xm-}\x03\xbfWV\x1f\x87\xdd7gd~\xf8^\x87\xee\xd4CO\a\xf4\xaaP*&\xb8r\x9eS\xc5\x9d', 0x0, 0x0) 05:53:07 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@local, @in6}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:07 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2006d000, 0x1000000}], 0x0) [ 2395.933088][T24219] UBIFS error (pid: 24219): cannot open "ubi!_0x0", error -19 05:53:07 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2395.933822][ T3841] UBIFS error (pid: 24219): cannot open "ubi!_0x0", error -19 05:53:07 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x500, 0x0) [ 2396.054381][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2396.060209][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:53:07 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!0\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:07 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2396.149670][T24309] UBIFS error (pid: 24309): cannot open "ubi!_0x0", error -19 [ 2396.152781][ T3841] UBIFS error (pid: 24309): cannot open "ubi!_0x0", error -19 05:53:07 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x600, 0x0) [ 2396.232121][T24344] UBIFS error (pid: 24344): cannot open "ubi!0", error -19 [ 2396.237917][ T3841] UBIFS error (pid: 24344): cannot open "ubi!0", error -19 05:53:07 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r1, 0x4) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d09101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f80616c65442"], 0x80) ftruncate(r2, 0x10099b7) accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2396.294275][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2396.300079][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:53:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:07 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.advise\x00') [ 2396.343316][T24349] UBIFS error (pid: 24349): cannot open "ubi!_0x0", error -19 [ 2396.343974][ T3841] UBIFS error (pid: 24349): cannot open "ubi!_0x0", error -19 05:53:07 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:07 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x700, 0x0) [ 2396.447282][T24357] UBIFS error (pid: 24357): cannot open "ubi!_0x0", error -19 [ 2396.463287][ T3841] UBIFS error (pid: 24357): cannot open "ubi!_0x0", error -19 [ 2396.648534][T24543] UBIFS error (pid: 24543): cannot open "ubi!_0x0", error -19 [ 2396.651397][ T3841] UBIFS error (pid: 24543): cannot open "ubi!_0x0", error -19 05:53:08 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x20289000, 0x1000000}], 0x0) 05:53:08 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback, 0x1000}, 0xffffffffffffff77) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000422}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0x9c, r2, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x400}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xea}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x163f}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7fff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) lsetxattr$security_selinux(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='security.selinux\x00', &(0x7f0000000580)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x1) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) write$P9_RREADDIR(r3, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xff) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0xfffffffffffffee1) 05:53:08 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:08 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xc00, 0x0) 05:53:08 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:08 executing program 3: [ 2396.912361][T24571] UBIFS error (pid: 24571): cannot open "ubi!_0x0", error -19 05:53:08 executing program 3: mount(&(0x7f0000000200)=@sr0='/dev/sr0\x00', &(0x7f0000000080)='.', &(0x7f0000000180)='u\x00g\xcd\xc4\xdd\xc8I\x19\ry\xb2\x95\x10\n\x80\xa9', 0x100080, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200040, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) 05:53:08 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x2cc, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:08 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2396.913237][ T3841] UBIFS error (pid: 24571): cannot open "ubi!_0x0", error -19 05:53:08 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xd26, 0x0) 05:53:08 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1020, 0x0) 05:53:08 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:08 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:08 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x203dd000, 0x1000000}], 0x0) 05:53:08 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r1, 0x10001) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:08 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1200, 0x0) 05:53:08 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001500)='/dev/dsp\x00', 0x2000, 0x0) recvfrom$ax25(r0, &(0x7f0000001540)=""/192, 0xc0, 0x1, 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000002) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="80"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e21, @multicast2}}, 0x0, 0xfffffffffffffffa, 0x0, "4a047962ff38e36d63ef281f3d0d82d57bd8197db3f2e1643ca935c1855066710b117f17deb1288719e2cc2bb879365ba8e72ab32a3d01feb73b1e852d5bef3100acc7db76169243b3b265c07b14a83f"}, 0xd8) 05:53:08 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:09 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:09 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1800, 0x0) [ 2397.555566][ T3841] UBIFS error (pid: 24906): cannot open "€", error -22 05:53:09 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101dd79ce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0xd8) 05:53:09 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ubifs\x00', 0x800000000210000, 0x0) 05:53:09 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1e00, 0x0) 05:53:09 executing program 5: r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:09 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r2}}, 0x18) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000001c0)={0x7}, 0x4) [ 2397.996460][T25141] UBIFS error (pid: 25141): cannot open "ubi!_0x0", error -19 [ 2398.010113][ T3841] UBIFS error (pid: 25141): cannot open "ubi!_0x0", error -19 05:53:09 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21059000, 0x1000000}], 0x0) 05:53:09 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:09 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1f00, 0x0) 05:53:09 executing program 5: r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:09 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2000, 0x0) 05:53:09 executing program 5: r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:09 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000000040)='ub\xed\xc1\xabe\xc2\x0fSW\xa1%,!\xf3\x81G\x03\x03B\x9c\x9eD^\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00;\x1b\t599\x12\xc9#\x884\x1f^O\xf7\xa5\x96(D\xee\xcdau8\xd6l\xe4wz3\xf5*\xfb\x97L\x8an\xd9E\b5n\xe8c;\x90\x9d(\xe0\x92\xa0\x9d\xb5k\xf6\xb8\xfb\xca\xc6\xb2\xea/\xa9\x8e\x13\xad\x9a\xf1', 0x0, 0x0) 05:53:10 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000002c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:10 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2010, 0x0) 05:53:10 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:10 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0xa65, 0xfffffffffffffff7}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0xfffffffffffffffb, 0x20, 0x6, 0x9}, &(0x7f0000000300)=0x18) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="54010000", @ANYRES16=r1, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 05:53:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:10 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21060000, 0x1000000}], 0x0) 05:53:10 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2400, 0x0) 05:53:10 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x60801, 0x0) getsockname$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) sendto$packet(r0, &(0x7f0000000280)="031516cd1186e9b8e3f32f50089a0a6fccbe9f88886adcc1ff694210263ade3009b5b3344f6e1fd48dc34349529ab6c1988585df765df4ec535b4806d3ac4a67d998fdbd476879e8f04072d55bf04b450dbce34b332a931d14ecabcbe91b6903d16637cc036040587cec00c4827fe3bc040a7f937bba2fcda8ce10a8efe349678e6267448c462f90e78e6c45ef13ab2f6aac638f4bfd8f4ba8b9150bdbdbc737161fc931cb327984e87f90c2a774eac40f0fce04ced251b60382261ce4de1eecc1c054542ccb5bed42bf9d81d8fc7a0648bf02e447abef1a90f441c5d1957128144b813868cb97fa740c825f9fa916391818fc", 0xf3, 0x20000000, &(0x7f0000000400)={0x11, 0xff, r1, 0x1, 0x4, 0x6, @remote}, 0x14) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x2, 0x10000, 0x1, 0x0, 0xe64, 0x1ff, 0x101, {0x0, @in6={{0xa, 0x4e20, 0x5, @rand_addr="211725725f87e42974ef0e9a3a9f86ce", 0x6}}, 0x6, 0x7, 0x7fffffff, 0x7f, 0x1}}, &(0x7f00000001c0)=0xb0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r2, 0xd44, 0x7fffffff}, &(0x7f0000000240)=0x8) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="756269c15f30783000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x80004, 0x0) 05:53:10 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:10 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) r2 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000440)="841a6a7363bcdc160564defe0e69eee2ce42265348970d2a1f38061bb7ea5358c9977324a613f964e83513947ac19cf6aea6d0a89ed05db992813d21e13cfd3f7c4c410219f00e26f052bf9004c94a92bf66543391e456376edcc3c5b1af99cd3f63f56eb5009d3ba72f0136f5c7efa49921f70c4410c5264403b956034fbf8b36f944fc8ba84f9e0969dd628c8cdf75e3c918ace8a22913a53b00b0f3ca9b06c09e3a2d3fe4801db443739b2c042e94dcf2f6cbfc94dc7cee91ec24f9dbf67f1d9d22ea69", 0xc5, 0x0) keyctl$restrict_keyring(0x1d, r2, &(0x7f00000001c0)='.dead\x00', &(0x7f00000002c0)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:10 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x260d, 0x0) 05:53:10 executing program 3: mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:10 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2a00, 0x0) 05:53:10 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:10 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c668c1bb05465f3180e600522dced3ced61f47cbae3c9390502ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:11 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x210e1000, 0x1000000}], 0x0) 05:53:11 executing program 3: mount(&(0x7f0000000100)=@sg0='ubi!_0x0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='erofs\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x5) 05:53:11 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3000, 0x0) 05:53:11 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:11 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@null=' \x00', 0x7, 'veth0_to_team\x00'}) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) fcntl$setsig(r2, 0xa, 0x2) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:11 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3600, 0x0) 05:53:11 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:11 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:11 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3c00, 0x0) 05:53:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:11 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2400.212367][ C1] net_ratelimit: 18 callbacks suppressed [ 2400.212376][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2400.223946][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:53:11 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21107000, 0x1000000}], 0x0) 05:53:11 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) acct(0x0) 05:53:11 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3f00, 0x0) 05:53:11 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ubifs\x00MnlR\xb4\xd5\xd2iq\x83TiI\x8c\a\x1e4\x1b\x9b\xf9\x1a\xa5\xe7\xd7N7\xe8Q\x8e\t\x89\r\xca&\x1a\xecAoPv\x13\xedt\xfb&\xe7\x93\xa0\xf5`v\xec\x85\x01M\x0f\x88\xc9\bOy\x81\x82F\xe7\xe1\xbf\x13\x7fa\xa6s\a\xf1^P\xbaY\xfbD\xa8f\xf1\x1c\xed\xf5\b\xad\x94\x0e\xb5v\x00\a\x0e\xa5ED\x97Dl\xe5[m8\x8b\xce\xa9\xdd\x82.\xc0@\xb6\x11\b4K\r\xf7~\r\x1f\xcc\xc7ch\"T\xbf\x00\x00\x00', 0x0, 0x0) 05:53:11 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:11 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4800, 0x0) 05:53:11 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0xc00, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') mlockall(0x4) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r1, 0x200, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x1ff, @media='eth\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4c080}, 0x4000000) 05:53:11 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2400.452243][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2400.458108][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2400.464005][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2400.469786][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2400.475648][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2400.481425][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:53:12 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bc1c23d7a91ea64e1e1a12bc2d816a0eb53c4f2f0449273d561715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435ea9b5f8d78882628f806160f5c07e4b9b3f51741ca51f7cb5badf3e2ea58975fb3142cf0737bbd108e91415b8c7ce8c33dca03eb4885edab2dbee2a67370c36079834e5e471a828384368210d472f9cc602ebf8df1f183fcf3c60b00c2663159b80280ed39b4380facae348141b8eb1815da23b0abd107a083883c985b0b1fda912d9e824b6fe0cdc343aabaf2ade218d8aa7b3ac3f5a1535df49f1a1e1a73c6faed8d86cacda853d0573e431e677021c8ba54025839ca55f9edb016e78376f63b1e1a2c1adbb1986858a33e1188d0061f91023341bfcf3cf4997ab5a6da4ba003154a6e9a4e090771b1fae73a6b41e4d30339e76a4cab464e1ebb933f5e9d14c344773e8b5af260d096fe93ed6267a9db7004bcee200e8bbb291116a2894c66a6c549e271565f1f24872cafd9771c5c3484716c337f53165bc600e0a5a053cf68ca479357990f8c25ccc6b85a6da4a2866462d16dd6dc001a84f81999ea74b2d06a0401b67295022b5a96750cec2a81c344d1dc273bca75703cd6d1ea1548a2ed8e9c0331c89c7a451121906790830db06162e2b61352aa3bfaea6843028dc1122a5e848b2132913f21d0f8135c8d38881bf2197167c3bee0bac557346fd0792e936b191f4fc3562dcacf7c346f1841783fc7b4863c4646a7dcecd46b89766cab71d7e07d7f04dc5abe48e5fef0ce980a24d48bc138f52216128d024376d39a89f124621d44a3a0fef23b4299af5853e9a55f57eadb56e20a0b37"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2400.553947][T26718] UBIFS error (pid: 26718): cannot open "ubi!_0x0", error -19 [ 2400.573863][T26733] UBIFS error (pid: 26718): cannot open "ubi!_0x0", error -19 [ 2400.588173][ C0] UBIFS error (pid: 26733): cannot open "ubi!_0x0", error -19 [ 2400.612098][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2400.625375][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:53:12 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4c00, 0x0) 05:53:12 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:12 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x211d6000, 0x1000000}], 0x0) [ 2400.653672][ T3841] UBIFS error (pid: 26733): cannot open "ubi!_0x0", error -19 [ 2400.736109][T26851] UBIFS error (pid: 26851): cannot open "ubi!_0x0", error -19 [ 2400.737043][ T3841] UBIFS error (pid: 26851): cannot open "ubi!_0x0", error -19 05:53:12 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:12 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6800, 0x0) 05:53:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x401, 0x20, 0x3, 0x12, 0xffffffffffffffff, 0x5000000000}, 0x2c) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:12 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:12 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x6, 0x0) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:12 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:12 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6c00, 0x0) [ 2400.993920][ T3841] UBIFS error (pid: 26991): cannot open "ubi!_0x0", error -19 05:53:12 executing program 3: mount(&(0x7f0000000140)=ANY=[@ANYBLOB="c056e50ec3a0f551ae16d814e058a04d0420cbbdb869c95ce79a98fc271fb13c5f2c0dcde238df6ce5f703191a394e59657f1e7dcc62bdc755ed88637e231ebc24d4edce8f1c"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x801) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000080)={0x0, @bt={0x0, 0x80, 0x1, 0x0, 0x5, 0x6, 0x2, 0x8001, 0x6, 0x8, 0xffffffffffffffff, 0x1000, 0x6, 0x7, 0x1, 0x20}}) 05:53:12 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:12 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:12 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b5) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000080)='./file0\x00', r3, r4) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2401.243580][T27053] UBIFS error (pid: 27053): cannot open "ÀVåàõQ®ØàX M ˽¸iÉ\皘ü'±<_, Íâ8ßlå÷9NYe}Ìb½ÇUíˆc~#¼$ÔíÎ", error -22 [ 2401.250599][ T3841] UBIFS error (pid: 27053): cannot open "ÀVåàõQ®ØàX M ˽¸iÉ\皘ü'±<_, Íâ8ßlå÷9NYe}Ìb½ÇUíˆc~#¼$ÔíÎ", error -22 05:53:13 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2123b000, 0x1000000}], 0x0) 05:53:13 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1fe79d002343ecda6c513d0eb3b1acb20426b0744c57ccb6bfe6a4c4f3009c46f17afb2574ca76bc08f294b80309d31b0920389df6c16ebb4f891907b0448e9e894c2dc013b37e66"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r0, 0x10) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f0000000440)}}, 0x10) 05:53:13 executing program 3: mount(&(0x7f0000000040)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:13 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:13 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:13 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7400, 0x0) [ 2401.677497][T27281] UBIFS error (pid: 27281): cannot open "ubi!_0x0", error -19 05:53:13 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7a00, 0x0) 05:53:13 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000080)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae61f9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d180c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae2d45cf5246ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e20, 0x400, @dev={0xfe, 0x80, [], 0xb}, 0x2}}, 0xe101, 0x6, 0x5, 0x7, 0x4}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r3, 0x5}, &(0x7f0000000340)=0x8) 05:53:13 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2401.679624][ T3841] UBIFS error (pid: 27281): cannot open "ubi!_0x0", error -19 05:53:13 executing program 3: mount(&(0x7f0000000100)=ANY=[@ANYBLOB="756269215f30783000d7f2ea0af1d117fa1dcbe0e0d4c3736ba33dd2401cefe032d1b9b9aed92d65ce46ad4f93ee999e40000ef0e3f8a5be3c1ec803791c7917f558bdbc1e59789d0c335f8e03498713a7df155bd9b23827e5886d248bdb0105a7d02f784265fddc4695ad8446ab3e8ba8a27a8753ba9cdcef6f856a7c700cbd84d672d024433f72b0fcfe3e6d6e3b28b484b9b84b840d0d0a97278e6ab61ae5c42d2a92e09c09acc56198b502be30b5c92727ddb9b50ae0d73bdc48ef3d0c1a1b358ad97e837af0e7143dbe33e3c8512fb93a7ff77ed23d25cacee057e56c51afa1c9e0ef21"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:13 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xedc0, 0x0) [ 2401.928682][T27398] UBIFS error (pid: 27398): cannot open "ubi!_0x0", error -19 05:53:13 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:13 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x212e4000, 0x1000000}], 0x0) 05:53:13 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:13 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x15) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x81, 0x10000) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'ip_vti0\x00', 0x400}) [ 2401.929494][ T3841] UBIFS error (pid: 27398): cannot open "ubi!_0x0", error -19 05:53:13 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf000, 0x0) 05:53:13 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:13 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2402.162224][T27475] UBIFS error (pid: 27475): cannot open "(null)", error -22 [ 2402.173054][ T3841] UBIFS error (pid: 27475): cannot open "(null)", error -22 05:53:13 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf0ffff, 0x0) 05:53:13 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:13 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:13 executing program 3: mount(&(0x7f0000000000)=@md0='/dev/md0\x00', &(0x7f0000000040)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:13 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2131a000, 0x1000000}], 0x0) 05:53:13 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000000, 0x0) 05:53:13 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x88, r2, 0xc, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1d9b}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000001}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:13 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2402.557777][T27680] UBIFS error (pid: 27680): cannot open "/dev/md0", error -22 [ 2402.558362][T27711] UBIFS error (pid: 27680): cannot open "/dev/md0", error -22 [ 2402.577438][ T3841] UBIFS error (pid: 27711): cannot open "ubi!_0x0", error -19 05:53:14 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400200, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000080)={0x0, @bt={0x800, 0x0, 0x1, 0x0, 0x2, 0x3, 0x4, 0x1ff, 0x7, 0x9, 0xffff, 0x3f, 0x5, 0x76, 0x1, 0x36}}) 05:53:14 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2000000, 0x0) [ 2402.632255][ T3841] UBIFS error (pid: 27711): cannot open "ubi!_0x0", error -19 05:53:14 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:14 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:14 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced2ced61f47cbae327759830ecae4d8f450646ded57eff0700008bbc82149fe79d550f78094856cd6b160500000035df9b5f8d78882628f806210f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:14 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x213b3000, 0x1000000}], 0x0) [ 2402.813149][T27768] UBIFS error (pid: 27768): cannot open "ubi!_0x0", error -19 [ 2402.814945][T27770] UBIFS error (pid: 27768): cannot open "ubi!_0x0", error -19 [ 2402.817084][T27770] UBIFS error (pid: 27770): cannot open "ubi!_0x0", error -19 05:53:14 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3000000, 0x0) [ 2402.853455][ T3841] UBIFS error (pid: 27770): cannot open "ubi!_0x0", error -19 05:53:14 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:14 executing program 3: mount(&(0x7f0000000180)=@sr0='/dev/sr0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='befs\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xbe, 0x101400) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000040)=@tipc=@name, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/248, 0xf8}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x40012021) 05:53:14 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:14 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x100000000) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2403.045703][T27989] UBIFS error (pid: 27989): cannot open "ubi!_0x0", error -19 [ 2403.046347][ T3841] UBIFS error (pid: 27989): cannot open "ubi!_0x0", error -19 05:53:14 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:14 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4000000, 0x0) [ 2403.288017][T28098] UBIFS error (pid: 28098): cannot open "ubi!_0x0", error -19 05:53:14 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:14 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x5000000, 0x0) 05:53:14 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) [ 2403.288963][ T3841] UBIFS error (pid: 28098): cannot open "ubi!_0x0", error -19 05:53:14 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="62389a3c801f535a36dbe6c0f807cee98e6fcdd53ade6b3d80104c444e91c77cc6b8cc34d3a0783e1c791035c140a49fc2326d185c2b939a137c6505a169f2b208f40225780e33141e0f2cefeaeb07398c9c78f098be53758cce83c62262203e7e8749e03d31bfac60617336f3ac2881973e4657a323c9bca9c74222f4a8155a5e4d44fd99723b492203328c172b"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffbae60b9b202ad7558efd3fc9a77ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c834f73d8235167368b5a541d9a58fc0bd493a9333e6f8c7ddb1b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) pipe2(&(0x7f0000000080), 0x84800) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2403.550443][T28217] UBIFS error (pid: 28217): cannot open "ubi!_0x0", error -19 [ 2403.551371][T28218] UBIFS error (pid: 28217): cannot open "ubi!_0x0", error -19 [ 2403.575629][ T3841] UBIFS error (pid: 28218): cannot open "ubi!_0x0", error -19 05:53:15 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:15 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21c04000, 0x1000000}], 0x0) 05:53:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:15 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6000000, 0x0) 05:53:15 executing program 3: mount(&(0x7f0000000480)=ANY=[@ANYRESHEX], &(0x7f0000000040)='.', &(0x7f0000000440)='vxfs\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000280)) syz_open_dev$ndb(&(0x7f0000000200)='/dev/nbd#\x00', 0x0, 0x2040) write$P9_RLCREATE(r0, &(0x7f00000000c0)={0x18, 0xf, 0x2, {{0x8, 0x1, 0x6}, 0x1}}, 0x18) r1 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x3f, 0x400) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) r2 = dup(r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000080)=0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x2, 0x4) 05:53:15 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x7c, "20493eae8560e3b3bcc7bef93e715c2ee7191ebeccc85dcc1959308303ac8ac9fb63a3d8a83edb1013bad8192f8947e80ac318631044e429e64409d4bfdcbe54a82ffdae23a7d4ca2e5418bffec303024b156bb4fe549bb4597342a6c2f9d5fcd02e44908dbdce8b61e1e8a3bbab4729d5b4f2b03eb3ea9ab80179ed"}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={r3, 0x9, 0xff, 0x0, 0xdcd, 0x6}, &(0x7f00000001c0)=0x14) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2403.923795][T28340] UBIFS error (pid: 28340): cannot open "ubi!_0x0", error -19 05:53:15 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:15 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7000000, 0x0) [ 2403.926984][ T3841] UBIFS error (pid: 28340): cannot open "ubi!_0x0", error -19 05:53:15 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000440)="cdf99bc4d24e944c762b573b9c8fde7378800aa1639b9ed8a5c12a6078b2b996e7f8cfd036f7551068ce0c31462b07631691b3567d2ca742abbf7092ca74d1cef79f29cce6eb49ac2a27b76c80cab42073f03ba67d8d7f56c9275e647e097bc53e06a20ee9250849f2a3f47a2c34f74b14860c0c931888b1af99bb15552ef3dc321268bad6ee0d4a3b25665873debdaaf4722c0fe6bfa0f77e9f6d80e3391a3c7fd3f1086ab649232c236af9b23d1d43f12de34a7b63d490b9d0ec0a58e6af942c3d3bdaf7e83c43", 0xc8, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000001c0)={r2, 0xa5b8, 0x8}, &(0x7f00000002c0)={'enc=', 'oaep', ' hash=', {'sha256-arm64-neon\x00'}}, &(0x7f0000000540)="d9aebc65d1470fe7a07f3ab221d43ea2df8a2ce5360643f023cab06bc283913b4c5a4236a3b319fd8d45d8dbfcb3b901d4516fc785e4347eccc86b12a495dba0491febe47f16d780d7c0d926f08a94215067753eacb38c98c9db0e6e2a57bea60db4ca71a5dc1efabab4cda65de6225e28dcde6c2a9269be6686a59b4131d056ab7453c75ec106a86eb1c2570d64d2421116de167352c0810773", &(0x7f0000000340)) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:15 executing program 3: mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='urifrsz\n13Hu7\x98\x05p|\\\x1d\x11\xbd\x86Gh\x9e\xf68M\x91w\x96>i+\xe1\xefh\x00w\xb1\x19\xf3~~\x8c\xe1\x82[!\x9b\x8fyg\x1fj\x9a\xb6<\x82WB\x10D;G\x88\x8c\xaa~u\xc3\xb9F\x8c\xb5N\xa3\xe7\xf1\xf1\x94:\xa3\x8b\xc5V47W\xea\xec\x84\xca\xb8\xfb\x81\xe8\xca\xa4\\f\xba!l\x1e\x91\a =\x17L\x8e\xea\f\xc1+\x05q\xfd>\x93waL-\xe4\xda-6\x06\x8c\xebm\xfe\xb0\x9b\x92Y\x86B\xd4\x8ff\x1b\xa2^\n\x06\x1a\x1a\x9aN\xb6\xe3dYu\xe8a3-W\x83\x8d\x97\x0e\xb3va\f\b&\x87\xd3\x96k\xa1:\x9d\xf9>i<\xb7f\x06\x1b\xaf\xa9\x8f+\x86T\xee\xa2*\x95\xd3\x9b\xd2\x0f\xfd\xdd)\xe1\x1b', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x400000, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/qat_adf_ctl\x00', 0x2800, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000540)='/dev/cec#\x00', 0x0, 0x2) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/qat_adf_ctl\x00', 0x800, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/qat_adf_ctl\x00', 0x44000, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000640)={0x1, 0x5, [{r1, 0x0, 0xfffff000, 0xfffffffff1001000}, {r2, 0x0, 0x10000fffff000, 0x1000000}, {r3, 0x0, 0x100000000, 0x1000000}, {r4, 0x0, 0x1000000000000, 0x100002000}, {r5, 0x0, 0x0, 0x10000}]}) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000200)=@v2={0x7, 0x1, 0xa, 0x0, 0xef, "3031bf86e26e8cde2d00f38b2be7505ebee12646f87121e47ec4506ca765fbb9bc09ce6f38ec374cb5c3d69c4d25f53f756a45d1d8aead3a21c3d28631cb3333600ea514fb619921700eddaba6f6065dce3ef32b4cf36eb2f87cb7a30f32cffc08af0dea7b606d696bd85df725ffc1db009b0d1c11734210f57f1ed3184f4f3c06b2f8cb8699885d3c58353c57aa742a7b61bafe3adb36a708e9985005d911781494cc11a0f620d17ee9691a058932d1f8efc14c30445c4e1344bff83c90a3027cd71db46cdd94017f2fff46da784abeb05cff1f6085e3b9fc7dfee162cb720157805575a6332feaab0b89ebce4e11"}, 0xf9, 0x3) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffff9c, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000380)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x4, @local, 0xad78}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r6, &(0x7f0000000480)={0x11, 0x10, 0xfa00, {&(0x7f0000000340), r7}}, 0x18) 05:53:15 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2404.195063][T28550] UBIFS error (pid: 28550): cannot open "ubi!_0x0", error -19 [ 2404.197656][ T3841] UBIFS error (pid: 28550): cannot open "ubi!_0x0", error -19 05:53:15 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xc000000, 0x0) [ 2404.455067][T28721] UBIFS error (pid: 28721): cannot open "ubi!_0x0", error -19 [ 2404.487550][ T3841] UBIFS error (pid: 28721): cannot open "ubi!_0x0", error -19 05:53:16 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21c06000, 0x1000000}], 0x0) 05:53:16 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:16 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r2, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r1, r3, 0x0, 0x88000fbfffffc) connect$unix(r2, &(0x7f0000000100)=@abs, 0x6e) 05:53:16 executing program 3: mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f44e70d06000000ce1c8748daaeea8100713bbc770700000022cf91fa29f4c6166e459c84b8d4c775e1f076883e9e4c7a80b3d0f825114857bfafdb7f069c6868fb5b358b1ff3e6c80500208f43752b8e41dd691082d000bc39b2e60055eb1b76b095014b030000006ba6db618e4669adc2690b3887751f08000000000000007e00b0a45040336dabc639f5bd570000000000000000000000"], &(0x7f0000000100)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:16 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xd260000, 0x0) 05:53:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:16 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x12000000, 0x0) 05:53:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x20, 0x7, 0xffffffffffffc01c}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000180)={r4, 0x4}, &(0x7f00000001c0)=0x8) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfd1c, 0x0, 0x0, 0x1e6) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:16 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:16 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="d7043ecd3079c6e4303d4ae137c11009369c22b0e6f6062cd0f35da9954833f7c24e04566b633fd1460763b7978fb3252d1761eff9"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2404.957327][T28891] UBIFS error (pid: 28891): cannot open "ubi!_0x0", error -19 05:53:16 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x18000000, 0x0) [ 2404.962461][T28889] UBIFS error (pid: 28891): cannot open "ubi!_0x0", error -19 [ 2405.060055][ T3841] UBIFS error (pid: 28889): cannot open "ubi!_0x0", error -19 [ 2405.138745][T28942] UBIFS error (pid: 28942): cannot open "ubi!_0x0", error -19 [ 2405.139536][ T3841] UBIFS error (pid: 28942): cannot open "ubi!_0x0", error -19 05:53:16 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21c78000, 0x1000000}], 0x0) 05:53:16 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:16 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1e000000, 0x0) 05:53:16 executing program 3: mount(&(0x7f0000000180)=@loop={'/dev/loop', 0x0}, &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/194, 0xc2) 05:53:16 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="271f56378c4fcc6d05e79f22ccfb5c8c2cdea74cb7558110d7d432c40e6cb95b1ebd62a82e43ff7fb8dc69af73fec33c1029d5b6bf2c5970890c6b6dbb0500000019a04471d5b991e0c2584b024cdc1daa6775bd6f3d5fe7d5ebd450ac7623aef0e28650542b648f2e670adf462ddf34e5b660e0f099388702cbaf3841d15fd65c1e05a7b3a6c0abe91dad12cc7161488da763d517ba7c2acec16191aae647adbb269af95f0d7c3b5a7428ae3e6c3777d6b8966de38b9b45c5753c733cadbf4a2e585638a03ef70f17d3b66dc60809aeee638591a52b8f4245a0c327f9465be2d326840aef4718769b802495a779dc438e71ab20f5f41e438bf77501ace0"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000440)={0x8, @win={{0x7, 0xfff, 0x7, 0x5}, 0x0, 0x0, &(0x7f00000002c0)={{0x1, 0xe8c, 0x8, 0x200}}, 0x22, &(0x7f0000000300)="c369c296745782e73077712be255eaa55af5641813c23b71b946132c6d1fec6720206b583f0533a279096bee7f425ef1c8337bf47426a703fb0497971db3e7b14db619b45e", 0x9}}) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) socket(0x3, 0x5, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'sit0\x00', {0x2, 0x4e24, @local}}) 05:53:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2405.446569][T29118] UBIFS error (pid: 29118): cannot open "ubi!_0x0", error -19 05:53:16 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000080), 0x4) 05:53:16 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1f000000, 0x0) [ 2405.447270][ T3841] UBIFS error (pid: 29118): cannot open "ubi!_0x0", error -19 [ 2405.540450][ T3841] UBIFS error (pid: 29179): cannot open "/dev/loop3", error -22 05:53:17 executing program 3: mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000380)='.', &(0x7f0000000040)='ubifs\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f00000000c0)=0x9) 05:53:17 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x3000000000, 0x80) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0)=0x5, 0x4) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r2, 0x6, 0x9, &(0x7f0000000300)=0xffff, 0x4) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000001c0)=0xffffffffffffffff, 0xffffffffffffffb0) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000440)={0x9, {{0xa, 0x4e20, 0xe00000000000000, @rand_addr="466f631f706d773fa7b708fee05da535", 0x8}}, {{0xa, 0x4e23, 0x0, @empty, 0x20000000}}}, 0x108) ftruncate(r3, 0x10099b7) sendfile(r1, r3, 0x0, 0x88000fbfffffc) connect$unix(r2, &(0x7f0000000100)=@abs, 0x6e) [ 2405.557499][ T3841] UBIFS error (pid: 29179): cannot open "/dev/loop3", error -22 [ 2405.602434][T29233] UBIFS error (pid: 29233): cannot open "ubi!_0x0", error -19 [ 2405.607729][ T3841] UBIFS error (pid: 29233): cannot open "ubi!_0x0", error -19 05:53:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:17 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2405.710624][T29239] UBIFS error (pid: 29239): cannot open "/dev/sr0", error -22 [ 2405.711835][ T3841] UBIFS error (pid: 29239): cannot open "/dev/sr0", error -22 05:53:17 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21cd6000, 0x1000000}], 0x0) 05:53:17 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000002c0)={0x4, [0x0, 0x0, 0x0, 0x0]}) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae6170bd5645bb3c23d7a91ea64e1e1a137715dd9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)=0x0) prlimit64(r3, 0x0, &(0x7f00000000c0)={0x8a36, 0x4}, &(0x7f00000001c0)) r4 = add_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="59fc39c1a27339409ff6d256f1f9436a140cec45fbc5f327e24c06a4312d5fd61fd1e993b42fa9d96f8627342b8da41af5bce65ad542edccab77565e9e74ebc49c66e886a4ba26d2bf0ec172f3befb51f80acdc4069edd1e344b6fdc39a6be323652ea70c599dbcfd51f13dd268a846af359e30e4efae2acbeda89f5b9a728f242588fc71ccb369ac8b3", 0x8a, 0xfffffffffffffff8) r5 = add_key(&(0x7f00000019c0)='rxrpc\x00', &(0x7f0000001a00)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, r4, &(0x7f0000001940)=[{&(0x7f0000000580)}, {&(0x7f00000005c0)="a8cbdb581688fa4b35381a3d5c2232bf3b5fc77bb0f86fc0828919ad0d0d50e7fc002773a0f54b10b4d66d2f85cc1e63bb1f6a4cfad574524f89eade9ba9759aca6695a8ac890ae626f612e956f40e59df7142ae86fbfbf0a2cbd4b71356064c34094d57989f89eb07b1ce67737dc74f4a4911d18e1ca9b48809c8cf75028caa90f5f30f538faf5f77a3427e3364be76331741244ec5d04a4ecdd6856f13d43cc4", 0xa1}, {&(0x7f0000000680)="ba09dc5082cb207fdea71848242105225c60e215bee68fc487cdf0c76eb3035fdcc2306a0b41844c74250b662f4e593c910db4b11a921a5663f93821528c7428d0f634e4e073fb86ce484062d8082727ec62cc817dfafd11d2e0dee67d37ce40d74589a84f070a10de11c99d058011", 0x6f}, {&(0x7f0000000700)="f75d6aa5a6917d04da3abd1bbd6cb1be9bf2efe1eac3d2c81c2aa574d6f08f862fd5301dfbe31e6562bfe45cd172b347daf4d30a0acc1a6e90dfe47896d6f43c98a8070445b9e0bcbb45711cb603a571c6ed9c6c4c45c33b08d81a5171", 0x5d}, {&(0x7f0000000780)="4448847fc9d57dcc8bf85512b2411a4e29edfea47c78fdb4ea1f19b4978ed121139b96382d60ebe7f8fceb2ce676aa03f45f70647a112e44ad5c65869fd81c62821c74c849aa28e96669e3f40341f5e6bade4e7f8803fec86de79ac4a5fda346d73c57513c49409b07576dd37f879c682c859bae464aff3d69be4986b701ccebecf1cb3a493d749af3b7b836a79c13b0fe3269039eb838a59feca7ef2b8d3c293e9376140ea8eefc45140de2bab78f0f93", 0xb1}, {&(0x7f0000000840)="6b3f6d4cdafa4e9b4248f01bb2f5d6fe30e5a67f86f7b49b2d7d1882c88864f83ac71ab82d160d79caf3dc622388d729dc452a811038abbfd1ac5eee87cde02242a2dc127cf6a5389767fc15314977b61a5952142305d841c51298afc2f91ff2af4fa19b2f4618bf5eac168ea17877e9821722724eb585af5c4418db073992a9218354f940d86e2dda6d72a5f4972a441b8d673491e166b2dd3878a54d89ce4330bc28ef38b1b3f5c6925e9f9b43e7174ffd058a72fedd8ed4f88c53a64fe099d070aefe123b6faef8cd4d6db27a537133b65dd4792d6bfcf6710b", 0xdb}, {&(0x7f0000000940)="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", 0x1000}], 0x7, r5) 05:53:17 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, 0x0, 0x0) 05:53:17 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x20000000, 0x0) 05:53:17 executing program 3: mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x3ff}, 0x8) socketpair(0xb, 0x6, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000280), 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x42000, 0x0) socket$packet(0x11, 0x0, 0x300) fchmodat(r2, &(0x7f00000000c0)='./file0\x00', 0x147) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[@timestamp, @timestamp, @sack_perm, @window={0x3, 0x996, 0x4}, @timestamp, @window={0x3, 0x1}], 0x6) 05:53:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2405.976877][T29455] UBIFS error (pid: 29455): cannot open "ubi!_0x0", error -19 [ 2405.977765][ T3841] UBIFS error (pid: 29455): cannot open "ubi!_0x0", error -19 05:53:17 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, 0x0, 0x0) 05:53:17 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x20100000, 0x0) 05:53:17 executing program 3: mount(&(0x7f00000000c0)=ANY=[@ANYRESOCT], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RXATTRWALK(r0, &(0x7f0000000100)={0xf, 0x1f, 0x2, 0x6}, 0x7) getsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x5}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r1, 0x7, 0x0, 0x7}, 0x10) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000080)) 05:53:17 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x24000000, 0x0) 05:53:17 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="294a4734e188a63aff06421f1661d8f5d44ac0e29a5ec96e52b3427be703840682807921aa50ad93af2c66e8b68ed6cb2ccdefaa486fd6ddca1c1c25295eb4b8fffda408f39916d037a2233e5badd77b2de9a2ea15a8b50cb16b011f1d1287ed6fa00de49c10"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:17 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, 0x0, 0x0) [ 2406.260978][T29682] UBIFS error (pid: 29682): cannot open "01777777777777777777777", error -22 [ 2406.262436][ T3841] UBIFS error (pid: 29682): cannot open "01777777777777777777777", error -22 [ 2406.328950][T29686] UBIFS error (pid: 29686): cannot open "ubi!_0x0", error -19 05:53:17 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21e0f000, 0x1000000}], 0x0) 05:53:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:17 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2a000000, 0x0) [ 2406.332807][ T3841] UBIFS error (pid: 29686): cannot open "ubi!_0x0", error -19 [ 2406.449205][ C1] net_ratelimit: 22 callbacks suppressed 05:53:17 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000440)="cdf99bc4d24e944c762b573b9c8fde7378800aa1639b9ed8a5c12a6078b2b996e7f8cfd036f7551068ce0c31462b07631691b3567d2ca742abbf7092ca74d1cef79f29cce6eb49ac2a27b76c80cab42073f03ba67d8d7f56c9275e647e097bc53e06a20ee9250849f2a3f47a2c34f74b14860c0c931888b1af99bb15552ef3dc321268bad6ee0d4a3b25665873debdaaf4722c0fe6bfa0f77e9f6d80e3391a3c7fd3f1086ab649232c236af9b23d1d43f12de34a7b63d490b9d0ec0a58e6af942c3d3bdaf7e83c43", 0xc8, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000001c0)={r2, 0xa5b8, 0x8}, &(0x7f00000002c0)={'enc=', 'oaep', ' hash=', {'sha256-arm64-neon\x00'}}, &(0x7f0000000540)="d9aebc65d1470fe7a07f3ab221d43ea2df8a2ce5360643f023cab06bc283913b4c5a4236a3b319fd8d45d8dbfcb3b901d4516fc785e4347eccc86b12a495dba0491febe47f16d780d7c0d926f08a94215067753eacb38c98c9db0e6e2a57bea60db4ca71a5dc1efabab4cda65de6225e28dcde6c2a9269be6686a59b4131d056ab7453c75ec106a86eb1c2570d64d2421116de167352c0810773", &(0x7f0000000340)) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2406.449214][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2406.460722][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:53:17 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00', 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000007800)={0x34, 0x6, 0x0, {0x1, 0x1, 0xb, 0x0, 'syzkaller1\x00'}}, 0x34) recvfrom$packet(r1, &(0x7f0000007680)=""/216, 0xd8, 0x1, &(0x7f00000077c0)={0x11, 0x1d, r2, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000006440)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/207, 0xcf}, {&(0x7f00000001c0)=""/138, 0x8a}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/225, 0xe1}], 0x4, &(0x7f0000001400)=""/20, 0x14}, 0x5583}, {{&(0x7f0000001440)=@hci, 0x80, &(0x7f00000025c0)=[{&(0x7f00000014c0)=""/71, 0x47}, {&(0x7f0000001540)=""/55, 0x37}, {&(0x7f0000001580)=""/44, 0x2c}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x4, &(0x7f0000002600)=""/193, 0xc1}, 0x3}, {{&(0x7f0000002700)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000003780)=[{&(0x7f0000002780)=""/4096, 0x1000}], 0x1, &(0x7f00000037c0)=""/118, 0x76}, 0x8}, {{&(0x7f0000003840)=@hci, 0x80, &(0x7f0000003b00)=[{&(0x7f00000038c0)=""/26, 0x1a}, {&(0x7f0000003900)=""/129, 0x81}, {&(0x7f00000039c0)}, {&(0x7f0000003a00)=""/189, 0xbd}, {&(0x7f0000003ac0)=""/19, 0x13}], 0x5}, 0x1000}, {{&(0x7f0000003b80)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/132, 0x84}], 0x2, &(0x7f0000004d00)=""/107, 0x6b}, 0x8f2}, {{&(0x7f0000004d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006080)=[{&(0x7f0000004e00)=""/195, 0xc3}, {&(0x7f0000004f00)=""/60, 0x3c}, {&(0x7f0000004f40)=""/4096, 0x1000}, {&(0x7f0000005f40)=""/8, 0x8}, {&(0x7f0000005f80)=""/221, 0xdd}], 0x5, &(0x7f0000006100)=""/180, 0xb4}, 0xfffffffffffff000}, {{&(0x7f00000061c0)=@nl=@proc, 0x80, &(0x7f0000006340)=[{&(0x7f0000006240)=""/147, 0x93}, {&(0x7f0000006300)=""/25, 0x19}], 0x2, &(0x7f0000006380)=""/158, 0x9e}, 0xfffffffffffffffb}], 0x7, 0x60, &(0x7f0000006600)) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000006640)=0x9, 0x4) 05:53:17 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) r2 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) fallocate(r2, 0x0, 0xfffffffffffffffe, 0x7) fallocate(r2, 0x0, 0x40000, 0x8005) fallocate(r2, 0x8, 0x4000, 0x8000) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x1, &(0x7f0000000000)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[]}}, 0x4c07c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080)=0x2, 0x4) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2406.516046][T29838] UBIFS error (pid: 29838): cannot open "ubi!_0x0", error -19 [ 2406.529906][ T3841] UBIFS error (pid: 29838): cannot open "ubi!_0x0", error -19 05:53:18 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000440)="cdf99bc4d24e944c762b573b9c8fde7378800aa1639b9ed8a5c12a6078b2b996e7f8cfd036f7551068ce0c31462b07631691b3567d2ca742abbf7092ca74d1cef79f29cce6eb49ac2a27b76c80cab42073f03ba67d8d7f56c9275e647e097bc53e06a20ee9250849f2a3f47a2c34f74b14860c0c931888b1af99bb15552ef3dc321268bad6ee0d4a3b25665873debdaaf4722c0fe6bfa0f77e9f6d80e3391a3c7fd3f1086ab649232c236af9b23d1d43f12de34a7b63d490b9d0ec0a58e6af942c3d3bdaf7e83c43", 0xc8, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000001c0)={r2, 0xa5b8, 0x8}, &(0x7f00000002c0)={'enc=', 'oaep', ' hash=', {'sha256-arm64-neon\x00'}}, &(0x7f0000000540)="d9aebc65d1470fe7a07f3ab221d43ea2df8a2ce5360643f023cab06bc283913b4c5a4236a3b319fd8d45d8dbfcb3b901d4516fc785e4347eccc86b12a495dba0491febe47f16d780d7c0d926f08a94215067753eacb38c98c9db0e6e2a57bea60db4ca71a5dc1efabab4cda65de6225e28dcde6c2a9269be6686a59b4131d056ab7453c75ec106a86eb1c2570d64d2421116de167352c0810773", &(0x7f0000000340)) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000001c0)=0x8, &(0x7f00000002c0)=0x2) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9bff03000012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000440)=""/234) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2406.650843][ T3841] UBIFS error (pid: 29906): cannot open "ubi!", error -22 [ 2406.689061][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2406.694848][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2406.700732][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2406.706525][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2406.712410][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2406.718183][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:53:18 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x30000000, 0x0) 05:53:18 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:18 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21fee000, 0x1000000}], 0x0) [ 2406.816854][T29996] UBIFS error (pid: 29996): cannot open "ubi!_0x0", error -19 [ 2406.817484][ T3841] UBIFS error (pid: 29996): cannot open "ubi!_0x0", error -19 05:53:18 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000440)="cdf99bc4d24e944c762b573b9c8fde7378800aa1639b9ed8a5c12a6078b2b996e7f8cfd036f7551068ce0c31462b07631691b3567d2ca742abbf7092ca74d1cef79f29cce6eb49ac2a27b76c80cab42073f03ba67d8d7f56c9275e647e097bc53e06a20ee9250849f2a3f47a2c34f74b14860c0c931888b1af99bb15552ef3dc321268bad6ee0d4a3b25665873debdaaf4722c0fe6bfa0f77e9f6d80e3391a3c7fd3f1086ab649232c236af9b23d1d43f12de34a7b63d490b9d0ec0a58e6af942c3d3bdaf7e83c43", 0xc8, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000001c0)={r2, 0xa5b8, 0x8}, &(0x7f00000002c0)={'enc=', 'oaep', ' hash=', {'sha256-arm64-neon\x00'}}, &(0x7f0000000540)="d9aebc65d1470fe7a07f3ab221d43ea2df8a2ce5360643f023cab06bc283913b4c5a4236a3b319fd8d45d8dbfcb3b901d4516fc785e4347eccc86b12a495dba0491febe47f16d780d7c0d926f08a94215067753eacb38c98c9db0e6e2a57bea60db4ca71a5dc1efabab4cda65de6225e28dcde6c2a9269be6686a59b4131d056ab7453c75ec106a86eb1c2570d64d2421116de167352c0810773", &(0x7f0000000340)) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:18 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x36000000, 0x0) [ 2406.859015][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2406.864808][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:53:18 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x41, 0x0) getsockname$llc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) [ 2406.989469][T30113] UBIFS error (pid: 30113): cannot open "ubi!_0x0", error -19 05:53:18 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00', 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000007800)={0x34, 0x6, 0x0, {0x1, 0x1, 0xb, 0x0, 'syzkaller1\x00'}}, 0x34) recvfrom$packet(r1, &(0x7f0000007680)=""/216, 0xd8, 0x1, &(0x7f00000077c0)={0x11, 0x1d, r2, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000006440)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/207, 0xcf}, {&(0x7f00000001c0)=""/138, 0x8a}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/225, 0xe1}], 0x4, &(0x7f0000001400)=""/20, 0x14}, 0x5583}, {{&(0x7f0000001440)=@hci, 0x80, &(0x7f00000025c0)=[{&(0x7f00000014c0)=""/71, 0x47}, {&(0x7f0000001540)=""/55, 0x37}, {&(0x7f0000001580)=""/44, 0x2c}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x4, &(0x7f0000002600)=""/193, 0xc1}, 0x3}, {{&(0x7f0000002700)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000003780)=[{&(0x7f0000002780)=""/4096, 0x1000}], 0x1, &(0x7f00000037c0)=""/118, 0x76}, 0x8}, {{&(0x7f0000003840)=@hci, 0x80, &(0x7f0000003b00)=[{&(0x7f00000038c0)=""/26, 0x1a}, {&(0x7f0000003900)=""/129, 0x81}, {&(0x7f00000039c0)}, {&(0x7f0000003a00)=""/189, 0xbd}, {&(0x7f0000003ac0)=""/19, 0x13}], 0x5}, 0x1000}, {{&(0x7f0000003b80)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/132, 0x84}], 0x2, &(0x7f0000004d00)=""/107, 0x6b}, 0x8f2}, {{&(0x7f0000004d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006080)=[{&(0x7f0000004e00)=""/195, 0xc3}, {&(0x7f0000004f00)=""/60, 0x3c}, {&(0x7f0000004f40)=""/4096, 0x1000}, {&(0x7f0000005f40)=""/8, 0x8}, {&(0x7f0000005f80)=""/221, 0xdd}], 0x5, &(0x7f0000006100)=""/180, 0xb4}, 0xfffffffffffff000}, {{&(0x7f00000061c0)=@nl=@proc, 0x80, &(0x7f0000006340)=[{&(0x7f0000006240)=""/147, 0x93}, {&(0x7f0000006300)=""/25, 0x19}], 0x2, &(0x7f0000006380)=""/158, 0x9e}, 0xfffffffffffffffb}], 0x7, 0x60, &(0x7f0000006600)) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000006640)=0x9, 0x4) 05:53:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:18 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x503880, 0x0) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz1\x00', {0x7, 0x2, 0x8, 0x37}, 0x52, [0x67ae, 0x8, 0x7, 0x7, 0x2, 0x8e07, 0xed5, 0x81, 0x5, 0x90000000000, 0xfffffffffffffffa, 0x8, 0x3, 0x1f, 0x1f, 0x5, 0x8, 0xb8, 0x8001, 0x100, 0x4cd0, 0x1, 0x10000, 0x3, 0x7f, 0x7fff, 0x7fffffff, 0x2, 0xffff, 0x100000000, 0xab16, 0x2, 0x1, 0x10000, 0x7, 0x2, 0x101, 0x6, 0x4f9c, 0x1cd80000000000, 0x7fffffff, 0x0, 0x7, 0x6, 0x0, 0x2, 0x401, 0x4, 0xb4f, 0x8, 0x7, 0xa742, 0x0, 0x5, 0x60, 0x547, 0x7, 0x80, 0x6, 0x4, 0x2, 0x4, 0xff, 0x7], [0x6dcf62a2, 0x5, 0x37, 0x93a6, 0x681, 0xc61, 0x75e7, 0x5, 0x100000001, 0x2, 0x800, 0x2, 0x2, 0x5, 0x7fffffff, 0x11, 0x773, 0x0, 0x400, 0x2, 0x100, 0x7, 0x238fbf45, 0x200, 0x2, 0x7, 0x1, 0x6, 0x42c1fff8, 0x6, 0x6, 0x1, 0x5, 0xba1, 0x3, 0xffffffff, 0x0, 0x3, 0xe2d, 0x6, 0x8, 0xa03, 0x6, 0x54, 0x800, 0x64e0, 0x7, 0x80000000, 0x2, 0x4, 0x200, 0x6, 0x80000001, 0x6, 0x68a, 0x0, 0x7, 0x136, 0x5, 0x401, 0xff, 0x180000000000000, 0x101, 0x8], [0x7, 0x2, 0x9, 0xafb7, 0x9, 0x7fff00, 0x7, 0x2, 0x8b2f, 0x0, 0x100, 0x400, 0x4, 0x4, 0x3, 0x7, 0x80000000, 0x5, 0x3, 0x6, 0x4, 0x2, 0x7fff, 0x3d1b, 0x957, 0x6, 0x6, 0x3, 0xfc2, 0x6, 0x600000000000000, 0x80000001, 0x7, 0xfe, 0x800, 0x6, 0x7, 0x3ff, 0x6, 0x5252, 0x9, 0xffffffffffffff28, 0x200, 0x8000, 0x1, 0x6796, 0x80, 0x6, 0x40, 0x2, 0x90000000, 0x2, 0x7ff, 0x9, 0x100, 0x6, 0x200, 0x7fffffff, 0x8, 0x10001, 0x33e, 0x7, 0x1, 0x400], [0x1, 0x6, 0x0, 0x5, 0x1af, 0x3f, 0x8, 0x6, 0x4c, 0x0, 0x81, 0xfff, 0x3, 0x2, 0x3, 0x5, 0x1, 0xffff, 0x2, 0x5, 0x3, 0x7fff, 0x2, 0x800, 0x897, 0x1, 0x9, 0x1, 0x4eb, 0xdcd3, 0x4, 0xe4db, 0x100000001, 0xfffffffffffffffa, 0x0, 0x4, 0xffffffff, 0xffffffff, 0x4, 0x1, 0x2, 0x7, 0xa1, 0x30b1, 0x3, 0x800, 0x5, 0x0, 0xc230, 0x8, 0xffffffffffffffe1, 0x1, 0x81, 0x0, 0x401, 0x4, 0x1, 0x9, 0x1f, 0x7, 0x3, 0x101, 0x3, 0x6]}, 0x45c) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000000c0)=""/42) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x73978000, 0x0, [], &(0x7f0000000040)=0x3e}) 05:53:18 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3c000000, 0x0) [ 2406.995680][ T3841] UBIFS error (pid: 30113): cannot open "ubi!_0x0", error -19 05:53:18 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:18 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00', 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000007800)={0x34, 0x6, 0x0, {0x1, 0x1, 0xb, 0x0, 'syzkaller1\x00'}}, 0x34) recvfrom$packet(r1, &(0x7f0000007680)=""/216, 0xd8, 0x1, &(0x7f00000077c0)={0x11, 0x1d, r2, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000006440)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/207, 0xcf}, {&(0x7f00000001c0)=""/138, 0x8a}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/225, 0xe1}], 0x4, &(0x7f0000001400)=""/20, 0x14}, 0x5583}, {{&(0x7f0000001440)=@hci, 0x80, &(0x7f00000025c0)=[{&(0x7f00000014c0)=""/71, 0x47}, {&(0x7f0000001540)=""/55, 0x37}, {&(0x7f0000001580)=""/44, 0x2c}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x4, &(0x7f0000002600)=""/193, 0xc1}, 0x3}, {{&(0x7f0000002700)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000003780)=[{&(0x7f0000002780)=""/4096, 0x1000}], 0x1, &(0x7f00000037c0)=""/118, 0x76}, 0x8}, {{&(0x7f0000003840)=@hci, 0x80, &(0x7f0000003b00)=[{&(0x7f00000038c0)=""/26, 0x1a}, {&(0x7f0000003900)=""/129, 0x81}, {&(0x7f00000039c0)}, {&(0x7f0000003a00)=""/189, 0xbd}, {&(0x7f0000003ac0)=""/19, 0x13}], 0x5}, 0x1000}, {{&(0x7f0000003b80)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/132, 0x84}], 0x2, &(0x7f0000004d00)=""/107, 0x6b}, 0x8f2}, {{&(0x7f0000004d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006080)=[{&(0x7f0000004e00)=""/195, 0xc3}, {&(0x7f0000004f00)=""/60, 0x3c}, {&(0x7f0000004f40)=""/4096, 0x1000}, {&(0x7f0000005f40)=""/8, 0x8}, {&(0x7f0000005f80)=""/221, 0xdd}], 0x5, &(0x7f0000006100)=""/180, 0xb4}, 0xfffffffffffff000}, {{&(0x7f00000061c0)=@nl=@proc, 0x80, &(0x7f0000006340)=[{&(0x7f0000006240)=""/147, 0x93}, {&(0x7f0000006300)=""/25, 0x19}], 0x2, &(0x7f0000006380)=""/158, 0x9e}, 0xfffffffffffffffb}], 0x7, 0x60, &(0x7f0000006600)) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000006640)=0x9, 0x4) 05:53:18 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21ff2000, 0x1000000}], 0x0) [ 2407.156401][T30184] UBIFS error (pid: 30138): cannot open "ubi!", error -22 [ 2407.214506][ T3841] UBIFS error (pid: 30184): cannot open "ubi!_0x0", error -19 05:53:18 executing program 3: syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0x71, 0x5, 0x2, 0x88, 0xe20}, 0x38) [ 2407.280696][ T3841] UBIFS error (pid: 30184): cannot open "ubi!_0x0", error -19 [ 2407.312002][ T3841] UBIFS error (pid: 30253): cannot open "ubi!", error -22 05:53:18 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3f000000, 0x0) 05:53:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) ioctl$sock_netdev_private(r0, 0x89f5, &(0x7f0000000080)="ab27a9b88a1d162ce91128deb95cb34c298357fe46814d646564f9807d1a8eb50c9049c2f3c60203fac0fe99ef9d786855672671b2f46e0a27b430cd191938a0e78201cdec8917ef870e05662f7785aafae67993cd71acdc73be") sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:18 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00', 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000007800)={0x34, 0x6, 0x0, {0x1, 0x1, 0xb, 0x0, 'syzkaller1\x00'}}, 0x34) recvfrom$packet(r1, &(0x7f0000007680)=""/216, 0xd8, 0x1, &(0x7f00000077c0)={0x11, 0x1d, r2, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000006440)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/207, 0xcf}, {&(0x7f00000001c0)=""/138, 0x8a}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/225, 0xe1}], 0x4, &(0x7f0000001400)=""/20, 0x14}, 0x5583}, {{&(0x7f0000001440)=@hci, 0x80, &(0x7f00000025c0)=[{&(0x7f00000014c0)=""/71, 0x47}, {&(0x7f0000001540)=""/55, 0x37}, {&(0x7f0000001580)=""/44, 0x2c}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x4, &(0x7f0000002600)=""/193, 0xc1}, 0x3}, {{&(0x7f0000002700)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000003780)=[{&(0x7f0000002780)=""/4096, 0x1000}], 0x1, &(0x7f00000037c0)=""/118, 0x76}, 0x8}, {{&(0x7f0000003840)=@hci, 0x80, &(0x7f0000003b00)=[{&(0x7f00000038c0)=""/26, 0x1a}, {&(0x7f0000003900)=""/129, 0x81}, {&(0x7f00000039c0)}, {&(0x7f0000003a00)=""/189, 0xbd}, {&(0x7f0000003ac0)=""/19, 0x13}], 0x5}, 0x1000}, {{&(0x7f0000003b80)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/132, 0x84}], 0x2, &(0x7f0000004d00)=""/107, 0x6b}, 0x8f2}, {{&(0x7f0000004d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006080)=[{&(0x7f0000004e00)=""/195, 0xc3}, {&(0x7f0000004f00)=""/60, 0x3c}, {&(0x7f0000004f40)=""/4096, 0x1000}, {&(0x7f0000005f40)=""/8, 0x8}, {&(0x7f0000005f80)=""/221, 0xdd}], 0x5, &(0x7f0000006100)=""/180, 0xb4}, 0xfffffffffffff000}, {{&(0x7f00000061c0)=@nl=@proc, 0x80, &(0x7f0000006340)=[{&(0x7f0000006240)=""/147, 0x93}, {&(0x7f0000006300)=""/25, 0x19}], 0x2, &(0x7f0000006380)=""/158, 0x9e}, 0xfffffffffffffffb}], 0x7, 0x60, &(0x7f0000006600)) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000006640)=0x9, 0x4) [ 2407.377237][T30289] UBIFS error (pid: 30289): cannot open "ubi!_0x0", error -19 [ 2407.393858][ T3841] UBIFS error (pid: 30289): cannot open "ubi!_0x0", error -19 [ 2407.428240][T30345] UBIFS error (pid: 30345): cannot open "ubi!_0x0", error -19 [ 2407.431021][ T3841] UBIFS error (pid: 30345): cannot open "ubi!_0x0", error -19 05:53:18 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x48000000, 0x0) 05:53:18 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:18 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00', 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000007800)={0x34, 0x6, 0x0, {0x1, 0x1, 0xb, 0x0, 'syzkaller1\x00'}}, 0x34) recvfrom$packet(r1, &(0x7f0000007680)=""/216, 0xd8, 0x1, &(0x7f00000077c0)={0x11, 0x1d, r2, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000006440)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/207, 0xcf}, {&(0x7f00000001c0)=""/138, 0x8a}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/225, 0xe1}], 0x4, &(0x7f0000001400)=""/20, 0x14}, 0x5583}, {{&(0x7f0000001440)=@hci, 0x80, &(0x7f00000025c0)=[{&(0x7f00000014c0)=""/71, 0x47}, {&(0x7f0000001540)=""/55, 0x37}, {&(0x7f0000001580)=""/44, 0x2c}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x4, &(0x7f0000002600)=""/193, 0xc1}, 0x3}, {{&(0x7f0000002700)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000003780)=[{&(0x7f0000002780)=""/4096, 0x1000}], 0x1, &(0x7f00000037c0)=""/118, 0x76}, 0x8}, {{&(0x7f0000003840)=@hci, 0x80, &(0x7f0000003b00)=[{&(0x7f00000038c0)=""/26, 0x1a}, {&(0x7f0000003900)=""/129, 0x81}, {&(0x7f00000039c0)}, {&(0x7f0000003a00)=""/189, 0xbd}, {&(0x7f0000003ac0)=""/19, 0x13}], 0x5}, 0x1000}, {{&(0x7f0000003b80)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/132, 0x84}], 0x2, &(0x7f0000004d00)=""/107, 0x6b}, 0x8f2}, {{&(0x7f0000004d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006080)=[{&(0x7f0000004e00)=""/195, 0xc3}, {&(0x7f0000004f00)=""/60, 0x3c}, {&(0x7f0000004f40)=""/4096, 0x1000}, {&(0x7f0000005f40)=""/8, 0x8}, {&(0x7f0000005f80)=""/221, 0xdd}], 0x5, &(0x7f0000006100)=""/180, 0xb4}, 0xfffffffffffff000}, {{&(0x7f00000061c0)=@nl=@proc, 0x80, &(0x7f0000006340)=[{&(0x7f0000006240)=""/147, 0x93}, {&(0x7f0000006300)=""/25, 0x19}], 0x2, &(0x7f0000006380)=""/158, 0x9e}, 0xfffffffffffffffb}], 0x7, 0x60, &(0x7f0000006600)) [ 2407.464708][ T3841] UBIFS error (pid: 30365): cannot open "ubi!", error -22 [ 2407.563150][T30430] UBIFS error (pid: 30430): cannot open "ubi!_0x0", error -19 [ 2407.570148][T30483] UBIFS error (pid: 30430): cannot open "ubi!_0x0", error -19 05:53:19 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x100) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x20400, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x0, 0x0) r3 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80000) r4 = socket$caif_stream(0x25, 0x1, 0x0) r5 = syz_open_dev$vivid(&(0x7f00000003c0)='/dev/video#\x00', 0x1, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x7fff, 0x88600) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000440)={0x5, 0x3, 0x6, 0x0, 0x0, [{r1, 0x0, 0x8}, {r2, 0x0, 0x9}, {r3, 0x0, 0x101}, {r4, 0x0, 0xfbd8}, {r5}, {r6, 0x0, 0x5}]}) r7 = getuid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f0000000840)={{}, {}, [{0x2, 0x7, r7}, {0x2, 0x1, r8}, {0x2, 0x7, r9}], {0x4, 0x1}, [{0x8, 0x6, r10}], {0x10, 0x4}, {0x20, 0x1}}, 0x44, 0x3) r11 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e20, 0x2, @mcast2, 0x2}], 0x2c) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000900)={0x8, &(0x7f00000008c0)=[{}, {}, {0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r6, 0x40086424, &(0x7f0000000940)={r12, 0x1}) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @remote}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) r14 = getgid() fchownat(r11, &(0x7f0000000100)='./file0\x00', r13, r14, 0x400) 05:53:19 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4c000000, 0x0) [ 2407.623141][ T3841] UBIFS error (pid: 30483): cannot open "ubi!", error -22 05:53:19 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:19 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x224f2000, 0x1000000}], 0x0) 05:53:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2407.776421][ T3841] UBIFS error (pid: 30619): cannot open "ubi!_0x0", error -19 [ 2407.803218][T30655] UBIFS error (pid: 30655): cannot open "ubi!_0x0", error -19 [ 2407.803933][T30619] UBIFS error (pid: 30655): cannot open "ubi!_0x0", error -19 [ 2407.812313][ T3841] UBIFS error (pid: 30619): cannot open "ubi!_0x0", error -19 05:53:19 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x68000000, 0x0) 05:53:19 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00', 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000007800)={0x34, 0x6, 0x0, {0x1, 0x1, 0xb, 0x0, 'syzkaller1\x00'}}, 0x34) recvfrom$packet(r1, &(0x7f0000007680)=""/216, 0xd8, 0x1, &(0x7f00000077c0)={0x11, 0x1d, r2, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000006440)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/207, 0xcf}, {&(0x7f00000001c0)=""/138, 0x8a}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/225, 0xe1}], 0x4, &(0x7f0000001400)=""/20, 0x14}, 0x5583}, {{&(0x7f0000001440)=@hci, 0x80, &(0x7f00000025c0)=[{&(0x7f00000014c0)=""/71, 0x47}, {&(0x7f0000001540)=""/55, 0x37}, {&(0x7f0000001580)=""/44, 0x2c}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x4, &(0x7f0000002600)=""/193, 0xc1}, 0x3}, {{&(0x7f0000002700)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000003780)=[{&(0x7f0000002780)=""/4096, 0x1000}], 0x1, &(0x7f00000037c0)=""/118, 0x76}, 0x8}, {{&(0x7f0000003840)=@hci, 0x80, &(0x7f0000003b00)=[{&(0x7f00000038c0)=""/26, 0x1a}, {&(0x7f0000003900)=""/129, 0x81}, {&(0x7f00000039c0)}, {&(0x7f0000003a00)=""/189, 0xbd}, {&(0x7f0000003ac0)=""/19, 0x13}], 0x5}, 0x1000}, {{&(0x7f0000003b80)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/132, 0x84}], 0x2, &(0x7f0000004d00)=""/107, 0x6b}, 0x8f2}, {{&(0x7f0000004d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006080)=[{&(0x7f0000004e00)=""/195, 0xc3}, {&(0x7f0000004f00)=""/60, 0x3c}, {&(0x7f0000004f40)=""/4096, 0x1000}, {&(0x7f0000005f40)=""/8, 0x8}, {&(0x7f0000005f80)=""/221, 0xdd}], 0x5, &(0x7f0000006100)=""/180, 0xb4}, 0xfffffffffffff000}, {{&(0x7f00000061c0)=@nl=@proc, 0x80, &(0x7f0000006340)=[{&(0x7f0000006240)=""/147, 0x93}, {&(0x7f0000006300)=""/25, 0x19}], 0x2, &(0x7f0000006380)=""/158, 0x9e}, 0xfffffffffffffffb}], 0x7, 0x60, &(0x7f0000006600)) [ 2407.990063][T30824] UBIFS error (pid: 30824): cannot open "ubi!_0x0", error -19 [ 2407.994480][T30849] UBIFS error (pid: 30824): cannot open "ubi!_0x0", error -19 05:53:19 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6c000000, 0x0) [ 2408.013287][T30614] UBIFS error (pid: 30849): cannot open "ubi!", error -22 05:53:19 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x5e20, 0xfffffffffffffffe, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:19 executing program 3: r0 = socket(0xf, 0x7, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000040)=0x9, 0x4) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xffffffff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='0\b\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000140)={r1, 0x3, 0x87, "138c036e4d102b3ef6b75702883de292691dd8888501600f97e18b46b2555e0c995181c156bdfae518d4328967d1c4ec9820045277cdd47f01169ccf55d99717ab6d491f5afd32c44789c6990c754cb504c1375ca8adcbb51fef9c1d61385514eb80cf8c2680b69ab19c4c12476b23b5ae2cdf18036ced77749f3eb538e1caf58ee92c5f26f095"}, 0x8f) 05:53:19 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00', 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000007800)={0x34, 0x6, 0x0, {0x1, 0x1, 0xb, 0x0, 'syzkaller1\x00'}}, 0x34) recvfrom$packet(r1, &(0x7f0000007680)=""/216, 0xd8, 0x1, &(0x7f00000077c0)={0x11, 0x1d, r2, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) 05:53:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2408.204924][T30912] UBIFS error (pid: 30912): cannot open "ubi!_0x0", error -19 [ 2408.222392][T30917] UBIFS error (pid: 30912): cannot open "ubi!_0x0", error -19 [ 2408.249126][T30932] UBIFS error (pid: 30917): cannot open "0", error -22 05:53:19 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) pipe2(&(0x7f0000000080), 0x84800) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:19 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x74000000, 0x0) 05:53:19 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x22537000, 0x1000000}], 0x0) [ 2408.269683][ T3841] UBIFS error (pid: 30932): cannot open "ubi!", error -22 [ 2408.391429][T31106] UBIFS error (pid: 31106): cannot open "ubi!_0x0", error -19 [ 2408.395652][ T3841] UBIFS error (pid: 31106): cannot open "ubi!_0x0", error -19 05:53:19 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7a000000, 0x0) 05:53:19 executing program 3: mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="c92690f864b1969d6d1364e0998cdc0000"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) 05:53:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:20 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00', 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000007800)={0x34, 0x6, 0x0, {0x1, 0x1, 0xb, 0x0, 'syzkaller1\x00'}}, 0x34) recvfrom$packet(r1, &(0x7f0000007680)=""/216, 0xd8, 0x1, &(0x7f00000077c0)={0x11, 0x1d, r2, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) 05:53:20 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) inotify_init() setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2408.650669][T31234] UBIFS error (pid: 31234): cannot open "ubi!_0x0", error -19 [ 2408.652144][T31242] UBIFS error (pid: 31234): cannot open "ubi!_0x0", error -19 [ 2408.665808][T31262] UBIFS error (pid: 31242): cannot open "É&ød±–mdà™ŒÜ", error -22 [ 2408.691340][T31242] UBIFS error (pid: 31262): cannot open "ubi!", error -22 05:53:20 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x8cffffff, 0x0) 05:53:20 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="56b678be9b665b5b1edd6454ffd5f6b11fd8b71a24aad45de7a983e1efa83a77d6576409fc1e040000003d1cf18e2c8d8ed45d227cec54"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:20 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000080)={0x43, 0x9, 0x2, {0x4, 0x7, 0x1, 0x10000, 0x2, 0xfffffffffffff8f2, 0x3, 0xeefbfd2, 0x4c4a8afc}}, 0x43) 05:53:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2408.705539][ T3841] UBIFS error (pid: 31242): cannot open "É&ød±–mdà™ŒÜ", error -22 05:53:20 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00', 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000007800)={0x34, 0x6, 0x0, {0x1, 0x1, 0xb, 0x0, 'syzkaller1\x00'}}, 0x34) recvfrom$packet(r1, &(0x7f0000007680)=""/216, 0xd8, 0x1, &(0x7f00000077c0)={0x11, 0x1d, r2, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) 05:53:20 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xc0ed0000, 0x0) [ 2409.018584][T31554] UBIFS error (pid: 31554): cannot open "ubi!_0x0", error -19 [ 2409.035675][T31575] UBIFS error (pid: 31554): cannot open "ubi!_0x0", error -19 [ 2409.055607][ T3841] UBIFS error (pid: 31575): cannot open "ubi!", error -22 [ 2409.205414][T31761] UBIFS error (pid: 31761): cannot open "ubi!_0x0", error -19 05:53:20 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00'}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000007800)={0x34, 0x6, 0x0, {0x1, 0x1, 0xb, 0x0, 'syzkaller1\x00'}}, 0x34) 05:53:20 executing program 3: mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2d0000000000000000547084da71c54ffec88f9929e6f104f75792277083ad812dda77943484c121a3212e7e351040378533f372a0e62c448a9e5ccbd348f90100dc46610fa49d67b35ad7002d76ac794ad471dcca7a774cf907f34c7eaad0ef4171341f43deb6409d79749ab925deae8677f5980474224149334793ad81245235390b"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:20 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2254b000, 0x1000000}], 0x0) 05:53:20 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000080)=0x8) [ 2409.212483][ T3841] UBIFS error (pid: 31761): cannot open "ubi!_0x0", error -19 05:53:20 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf6ffffff, 0x0) [ 2409.310796][ T3841] UBIFS error (pid: 31766): cannot open "ubi!", error -22 [ 2409.349610][ T3841] UBIFS error (pid: 31789): cannot open "-", error -22 05:53:20 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x100) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xffffffffffffffff, 0x0) 05:53:20 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007780)={'syzkaller1\x00'}) [ 2409.358274][ T3841] UBIFS error (pid: 31789): cannot open "-", error -22 05:53:20 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf9fdffff, 0x0) 05:53:20 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) ppoll(&(0x7f0000000440)=[{r0, 0x480}, {r0, 0x40}], 0x2, &(0x7f00000004c0)={r4, r5+10000000}, &(0x7f0000000500)={0x3d5a}, 0x8) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0x24, 0x70bd29, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x8000) ftruncate(r2, 0x10099b7) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000080)) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:21 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:21 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfeffffff, 0x0) [ 2409.567400][ T3841] UBIFS error (pid: 31886): cannot open "ubi!", error -22 05:53:21 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000007580)=[{{&(0x7f0000006680)=@nfc_llcp, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006700)=""/153, 0x99}, {&(0x7f00000039c0)=""/14, 0xe}, {&(0x7f00000067c0)=""/209, 0xd1}, {&(0x7f00000068c0)=""/58, 0x3a}, {&(0x7f0000006900)=""/196, 0xc4}, {&(0x7f0000006a00)=""/98, 0x62}, {&(0x7f0000006a80)=""/253, 0xfd}, {&(0x7f0000006b80)=""/135, 0x87}, {&(0x7f0000006c40)=""/90, 0x5a}], 0x9, &(0x7f0000006d80)=""/120, 0x78}, 0x1}, {{&(0x7f0000006e00)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/191, 0xbf}], 0x1, &(0x7f0000006f80)=""/201, 0xc9}, 0x39c6}, {{&(0x7f0000007080)=@ax25={{}, [@netrom, @default, @rose, @null, @null, @remote, @bcast, @null]}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007100)=""/43, 0x2b}, {&(0x7f0000007140)=""/39, 0x27}, {&(0x7f0000007180)=""/120, 0x78}], 0x3, &(0x7f0000007240)=""/128, 0x80}, 0x9}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007340)=""/84, 0x54}, {&(0x7f00000073c0)=""/126, 0x7e}], 0x2, &(0x7f0000007480)=""/215, 0xd7}, 0x10000}], 0x4, 0x100, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2409.838553][ T3841] UBIFS error (pid: 32046): cannot open "ubi!", error -22 05:53:21 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x225e3000, 0x1000000}], 0x0) 05:53:21 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000000c0)=[0xee01, 0xee01, 0xee01, 0xee01, 0x0, 0xffffffffffffffff, 0xee01]) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) stat(&(0x7f0000000200)='\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() r6 = getgid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x9, &(0x7f0000000480)=[r0, r1, r2, r3, r4, r5, r6, r7, r8]) 05:53:21 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfffff000, 0x0) 05:53:21 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 05:53:21 executing program 5: socket$pptp(0x18, 0x1, 0x2) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:21 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2410.031610][T32107] UBIFS error (pid: 32107): cannot open "ubi!_0x0", error -19 [ 2410.037923][ T3841] UBIFS error (pid: 32107): cannot open "ubi!_0x0", error -19 05:53:21 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfffffdf9, 0x0) 05:53:21 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x007x03'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2410.088990][ T3841] UBIFS error (pid: 32171): cannot open "ubi!", error -22 05:53:21 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:21 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xffffff8c, 0x0) 05:53:21 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:21 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYRES64=r2], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r2, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f00000002c0)) connect$unix(r2, &(0x7f0000000100)=@abs, 0x6e) [ 2410.272740][ T3841] UBIFS error (pid: 32324): cannot open "ubi!", error -22 05:53:21 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='u0\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000080)) 05:53:21 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2274f000, 0x1000000}], 0x0) 05:53:21 executing program 5: mount(0x0, &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:21 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfffffff6, 0x0) [ 2410.536512][T32442] UBIFS error (pid: 32442): cannot open "u0", error -22 [ 2410.547339][ T3841] UBIFS error (pid: 32442): cannot open "u0", error -22 [ 2410.575536][ T3841] UBIFS error (pid: 32445): cannot open "(null)", error -22 05:53:22 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:22 executing program 5: mount(0x0, &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:22 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e24, 0x3, @ipv4={[], [], @rand_addr=0x8}, 0x4}, {0xa, 0x4e24, 0xa77, @mcast2, 0xfffffffffffffffb}, 0x80000001, [0x0, 0x401, 0x704, 0x1, 0xfff, 0x100000001, 0x3, 0xff]}, 0x5c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:22 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfffffffe, 0x0) [ 2410.688794][ T3841] UBIFS error (pid: 32514): cannot open "(null)", error -22 05:53:22 executing program 5: mount(0x0, &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:22 executing program 3: mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='cifs\x00r\xd9L\xb5\x98\xaaUX\x023\xbc\xa0\x91\xb2\xf5\x02\xcf\xca\xf30x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2411.038880][ T3841] UBIFS error (pid: 32700): cannot open "(null)", error -22 05:53:22 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:22 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf0ffffffffffff, 0x0) 05:53:22 executing program 5: mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:22 executing program 3: mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:22 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:22 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0), 0x2) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:22 executing program 5: mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2411.457443][ T421] UBIFS error (pid: 413): cannot open "(null)", error -22 [ 2411.474479][ T421] UBIFS error (pid: 421): cannot open "/dev/nullb0", error -22 05:53:22 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x100000000000000, 0x0) [ 2411.514194][ T3841] UBIFS error (pid: 421): cannot open "/dev/nullb0", error -22 05:53:23 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x190, r3, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf76}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xed, @rand_addr="c7180695ab2f5297baf91d45c47caa88", 0x584}}}}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x4000081}, 0x8040) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7dd8f9a6fc8b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f802160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:23 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101000, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000240)=0xfff, 0x4) mount(&(0x7f0000000500)=ANY=[@ANYRESHEX=0x0, @ANYRESHEX, @ANYRESDEC, @ANYRESOCT, @ANYBLOB="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"], &(0x7f0000000000)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80000, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000300), &(0x7f0000000340)=0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r2, 0xc, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4000) [ 2411.600409][ T3841] UBIFS error (pid: 484): cannot open "(null)", error -22 05:53:23 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2411.797457][ T3841] UBIFS error (pid: 611): cannot open "(null)", error -22 05:53:23 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x244e2000, 0x1000000}], 0x0) 05:53:23 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x200000000000000, 0x0) 05:53:23 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:23 executing program 3: mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="01467cabb500000000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:23 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) sendto$inet6(r2, &(0x7f0000000080)="c788e1e2633d748223b6850f4c8704", 0xf, 0x4040, &(0x7f00000000c0)={0xa, 0x4e22, 0x7, @mcast2, 0x8}, 0x1c) 05:53:23 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x300000000000000, 0x0) 05:53:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2412.105921][ T3841] UBIFS error (pid: 749): cannot open "(null)", error -22 05:53:23 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:23 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x100, 0x0) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:23 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x400000000000000, 0x0) 05:53:23 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000006c0)=ANY=[@ANYRES64=r1, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYPTR, @ANYRES64=r0, @ANYPTR64, @ANYRES64=r1, @ANYRES16=r0, @ANYPTR64, @ANYRES64=r1, @ANYRESDEC=r1], @ANYRES32=r0, @ANYBLOB="040673796ade76b7096f0ef5c97c86e0d8b1b390f05ad8e3d7c3b345962dd7f516e64a5413c133cce963cf0f81b36b68412a8b20372efbd8cc75284f6445bc74e1e83167b4a3d4e48767694439b7b8618b7c41191b77672838d471ea2795dde911e0ef9ae9cbce121da349a13e9f04961d6ad90b9b124b887d89cdfcb78d920ccdb2dc3d5b243c4c7ea74b9c0cd62db371bd1f3daa3acdf57c927c3397e4f0332dc0d5cc4b15295d45b573d17c4982aae10f666fe12b22b445b1994a7787bb23da2b44a66f58013e1d982029a4fa9c7d810f9df3a510b4c3cca6d96cc68f6e901a1f5b10", @ANYRES64=r1], @ANYRESHEX=r1, @ANYRES16=r1, @ANYRESDEC=r1, @ANYRESDEC=r0, @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYBLOB="4e0ed990f4cd75b7f52b542f8f0d7e631fce62a8e9bc2188cd4eec25b7e91820880f8b037d38c897279e4e5715090d44799e19a11f9342afd84ad16b766e3b24d49aefc26cfcf03e06e7e10d0e9c7028b94fd057663da2c6deb1f383503862f2229e5869a6596f1ecf41c25fc4f92c3dcf010369a7243188531032e624c595160175363002263b3e4c61ad92a424a1759cd86330b37de523079f3cac699774e2189436ab3b0a848e9b935638b27b548aeda799d054269577f8f578cae937a539a8286c058c5a754bffabb68f3c0366ab9ce01ec1ac47d6b2b484249ec7d1ea9843a08b74", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR64], @ANYRESDEC=r1, @ANYRES32=0x0]], 0x7}, 0x1, 0x0, 0x0, 0x8000}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8133a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ec149fe79d550f78094856cd6b162bbbd48435df9bbfdd5f8d78882628f806160f5c07"], 0x80) ftruncate(r1, 0x10099b9) sendfile(r2, r2, 0x0, 0x88008fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2412.295544][ T794] UBIFS error (pid: 785): cannot open "ubi!_0x0", error -19 05:53:23 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB="756269055f30783000"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2412.311525][ T3841] UBIFS error (pid: 794): cannot open "(null)", error -22 [ 2412.499126][ T880] UBIFS error (pid: 880): cannot open "ubi_0x0", error -22 [ 2412.499810][ T3841] UBIFS error (pid: 880): cannot open "ubi_0x0", error -22 05:53:24 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24727000, 0x1000000}], 0x0) 05:53:24 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:24 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x500000000000000, 0x0) 05:53:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001500)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) r3 = add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)="8fb2418a3033d214d7f036b90f13882414c49d740e94576391e6518d06c0a222ac642bdbf2b0669cc5f24f19058aa6038d070498054c8c4bd8f464ca22f02332b0ad12634258ff85baeb169c8d347a8791659e664338c19a3317ce7f540f12b4c47e5114d8fe19fc62442149d11888da3b43fdf8c57efd5090facc7b42a8b7804bc6410cba687378dc5e07cd903e2d6f4d539e71312c797b4bc6b5dbf07269ac0902a8f4110239401e99f73903dc69e001175a", 0xb3, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000001c0)={r3, 0x3, 0x1}, &(0x7f0000000440)={'enc=', 'oaep', ' hash=', {'sha3-384-generic\x00'}}, &(0x7f00000004c0)="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", &(0x7f00000014c0)=""/10) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:24 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x22000) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000080)=0xffff, &(0x7f00000000c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000100)={0x7, 0xa1, 0xca, 0x5, 0x16f6, 0x20}) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2412.766121][ T898] UBIFS error (pid: 901): cannot open "ubi!", error -22 05:53:24 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='u'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:24 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x600000000000000, 0x0) 05:53:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000001c0)={0x0, 0x3, 0x3ff000000000, 0x5, 0xf92, 0x80}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000540)={0x0, 0x100}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000005c0)=@assoc_id=r3, 0x4) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffc1e60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d100e78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b160c9128e6a6b0d02bbbd48435df9b5f8d78882628f806cb115c07"], 0x80) ftruncate(r2, 0x10099b7) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000500)) sendfile(r0, r2, 0x0, 0x88000fbfffffc) write$sndseq(r1, &(0x7f00000003c0)=[{0x3, 0x3ff, 0x5, 0x100, @time={0x0, 0x989680}, {0x1, 0x72}, {0x0, 0x1}, @note={0x7, 0x8, 0x4, 0x1, 0x1}}, {0x8000, 0x8, 0x5, 0xffffffffffffffee, @tick=0x5, {0x7f, 0x100000001}, {0x0, 0x7}, @control={0xfffffffffffffc00, 0x2, 0x6}}, {0x8, 0xfff, 0x7, 0x8, @tick=0x8, {0x4b, 0x4}, {0x99d2, 0x5}, @time=@time={0x77359400}}, {0x6, 0xa6d, 0x3, 0x1, @tick=0x40, {}, {0x7, 0x5}, @raw8={"c7109cea2ba378a72efaa7b0"}}, {0x80, 0x1f, 0x0, 0x7fff, @tick=0x800, {0x3, 0x81}, {0x8, 0x25}, @raw8={"1ad11cb74aa429de3c479fff"}}, {0x9, 0x4, 0x9, 0xa20, @tick=0x8, {0x4db, 0x2}, {0x7, 0x100000001}, @raw32={[0x6, 0x8, 0x1]}}], 0x120) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2412.795262][ T3841] UBIFS error (pid: 898): cannot open "ubi!_0x0", error -19 05:53:24 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x700000000000000, 0x0) [ 2412.925986][ C0] net_ratelimit: 24 callbacks suppressed [ 2412.925996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2412.937494][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2412.943319][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2412.949160][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2412.955014][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2412.960839][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:53:24 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='u'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2413.037077][ C0] UBIFS error (pid: 1086): cannot open "u", error -22 [ 2413.085873][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2413.098498][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:53:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:24 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25403000, 0x1000000}], 0x0) 05:53:24 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xc00000000000000, 0x0) 05:53:24 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0xff, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x23e, &(0x7f0000000180)=0x1, 0xfffffffffffffdf2) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000080)={0x2, 0x1, [0x5, 0x7fffffff, 0x1ff, 0x187e, 0x9, 0x100000000, 0x8001, 0x8b]}) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:24 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='u'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:24 executing program 3: mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="7562215f00100000"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e21, 0x1, @mcast1, 0x40}, {0xa, 0x4e21, 0x5, @ipv4={[], [], @multicast1}}, 0x8, [0x9c, 0x5, 0x8, 0x0, 0x800, 0x5, 0x6, 0x9]}, 0x5c) fcntl$notify(r0, 0x402, 0xe) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) [ 2413.200827][ T3841] UBIFS error (pid: 1126): cannot open "u", error -22 05:53:24 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xd26000000000000, 0x0) 05:53:24 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170b64e1e1a161715d0d101d78cce8134a76e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f7809482bbbd48435df9b5f8d78882628f806160f5c07000000000000000000"], 0x80) fchdir(r1) ftruncate(r2, 0x7) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000080)={0xb3, 0x0, 0x1, 0x9}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f00000000c0)={0x9, r3}) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f00000002c0)={0x0, @reserved}) 05:53:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2413.398500][ T1254] UBIFS error (pid: 1251): cannot open "u", error -22 [ 2413.471952][ T3841] UBIFS error (pid: 1254): cannot open "ub!_", error -22 05:53:24 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1200000000000000, 0x0) [ 2413.575842][ T3841] UBIFS error (pid: 1283): cannot open "ubi", error -22 05:53:25 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2413.722492][ T3841] UBIFS error (pid: 1464): cannot open "ubi", error -22 05:53:25 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25514000, 0x1000000}], 0x0) 05:53:25 executing program 3: mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="757269215f5b790f8ddd2fcf9cd0"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) 05:53:25 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1800000000000000, 0x0) 05:53:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x9, @loopback, 0x80000000}, 0x1c) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:25 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:25 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2413.913286][ T1486] UBIFS error (pid: 1486): cannot open "uri!_[yÝ/ÏœÐ", error -22 [ 2413.925943][ T1488] UBIFS error (pid: 1486): cannot open "uri!_[yÝ/ÏœÐ", error -22 05:53:25 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1e00000000000000, 0x0) 05:53:25 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!f0x0\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x7fff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x150, 0x15, 0x1, 0x2, 0x6, 0x80000001, 0x5, 0x1, r1}, 0x20) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x9}) 05:53:25 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2413.938332][ T3841] UBIFS error (pid: 1488): cannot open "ubi", error -22 05:53:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="21291028c1121d942d684963cd8134c730dbcaeb90231404cbea3fb3dbf0a87c026c4937d71c56df6a863da063c5d5586c083e8f3cc796a7e90d6ec8ec42c079263fabf85ca0a83f4ed54a6eff8694d631b6d31015dec660638eb9d6f9405804a1707de0a0c35f9d7f5256ebb6f553f7a80f93c4e99b405ffde8927f1d735f6d38bde9a92b7a5d56ab9da24179868eb480d932cc129f56f85bd5ab7cf1992038e15f157029b04f1adf"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") close(r3) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r7, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfffffffffffffe1a, 0x0, 0x0, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:25 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1f00000000000000, 0x0) 05:53:25 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2414.114867][ T1616] UBIFS error (pid: 1598): cannot open "ubi!", error -22 [ 2414.144528][ T3841] UBIFS error (pid: 1616): cannot open "ubi!f0x0", error -19 [ 2414.263834][ T3841] UBIFS error (pid: 1670): cannot open "ubi", error -22 05:53:25 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2555d000, 0x1000000}], 0x0) 05:53:25 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:25 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2000000000000000, 0x0) 05:53:25 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:25 executing program 3: mount(&(0x7f0000000080)=ANY=[@ANYBLOB="058754a68e37e5f63000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback, 0x8}, 0xffffffffffffff96) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x4, 0xba8, 0x138, 0x0, 0x0, 0x138, 0x230, 0xb10, 0xb10, 0xb10, 0xb10, 0xb10, 0x4, &(0x7f0000000080), {[{{@ip={@multicast1, @local, 0xff, 0xffffff00, 'caif0\x00', 'caif0\x00', {0xff}, {0xff}, 0x5e, 0x1, 0x1}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@unspec=@statistic={0x38, 'statistic\x00', 0x0, {0x0, 0x0, 0x80, 0x2, 0x81, 0x7a1}}, @common=@set={0x40, 'set\x00', 0x0, {{0x6, [0x0, 0x2, 0x6, 0x0, 0x8, 0x2], 0x1ff, 0x9}}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x3}}}, {{@ip={@local, @loopback, 0x0, 0xffffff00, 'erspan0\x00', 'erspan0\x00', {0xff}, {0xff}, 0x0, 0x3, 0x20}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x3, [0xffff, 0xfc, 0x1, 0x7, 0x5, 0x14f], 0x9}, {0x5, [0x6c8b, 0x1, 0x7, 0x7, 0x5, 0x9], 0x2, 0x5}}}}, {{@uncond, 0x0, 0x8a0, 0x8e0, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0x7f}}, @common=@unspec=@u32={0x7e0, 'u32\x00', 0x0, {[{[{0x5}, {0x3e08, 0x1}, {0xfffffffffffffffb}, {0x5d7, 0x3}, {0x6}, {0x2}, {0x3, 0x1}, {0xfff, 0x1}, {0x6, 0x2}, {0x7f, 0x2}, {0x1}], [{0x7ff, 0x9}, {0x8, 0x80000001}, {0x9, 0xc00}, {0x4, 0x9}, {0x8001, 0x7}, {0xfffffffffffffff9, 0x8}, {0x8001, 0x2}, {0x0, 0x7fff}, {0x7, 0x80}, {0x1, 0x2}, {0x100, 0x4}], 0x6, 0x2}, {[{0xff, 0x3}, {}, {0x99f, 0x2}, {0x51, 0x2}, {0x95, 0x3}, {0x0, 0x3}, {0x40, 0x1}, {0x6}, {0x20000000000000, 0x3}, {0x5}, {0x3, 0x3}], [{0x7, 0xfffffffeffffffff}, {0xffffffff, 0x1}, {0x1, 0x2}, {0xda7, 0x8}, {0x0, 0x8}, {0x3, 0x800}, {0xff, 0x1}, {0x2, 0x7fff}, {0xfb5, 0x80}, {0x1ff, 0x9}, {0x5, 0x3}], 0x9, 0x5}, {[{0x2e000, 0x3}, {0x40000, 0x1}, {0xb}, {0x6}, {0x6}, {0x5, 0x1}, {0x4, 0x3}, {0x7}, {0x5}, {0x1, 0x3}, {0x1000, 0x2}], [{0x8001, 0x7}, {0x9, 0x5}, {0x7fff, 0xfff}, {0x6, 0x4}, {0x800, 0x2}, {0x3ff, 0x8fa3}, {0xffffffff80000000}, {0x3, 0x5}, {0x3, 0x1}, {0x5, 0x8}, {0xdd, 0x7}], 0x5, 0x2}, {[{0x2, 0x1}, {0x7, 0x2}, {0x0, 0x3}, {0x8, 0x1}, {0x4, 0x2}, {0x8bc, 0x3}, {0x2, 0x1}, {0xffffffff00000001, 0x1}, {0x8, 0x3}, {0x4, 0x3}, {0x3}], [{0xea, 0x401}, {0x1, 0x4e6}, {0x6, 0x2}, {0x26e10, 0x8000}, {0x100000001, 0xbe1d}, {0x1, 0x1ad7}, {0x7f, 0x2}, {0x4, 0x4}, {0x1, 0xfe}, {0x3fff80, 0x1ff}, {0xffffffff9193b45f, 0x800}], 0x9, 0x4}, {[{0x5, 0x2}, {0x40, 0x3}, {0x600000000000000}, {0x8, 0x3}, {0x8, 0x2}, {0x80000001, 0x2}, {0xc7}, {0x40, 0x3}, {0x8, 0x3}, {0x7, 0x3}, {0xe72e}], [{0x1, 0x8}, {0x2, 0xa5e}, {0x61b8, 0x7}, {0x1, 0xac5f}, {0x7fff, 0x9}, {0x1, 0x8}, {0x0, 0x4000000000}, {0x4, 0x8001}, {0x10001}, {0x0, 0x9f9a}, {0x8, 0x100000000}], 0x1, 0x9}, {[{0xffffffffffffffa9, 0x3}, {0x2, 0x1}, {0x4, 0x2}, {0x7, 0x3}, {0x8, 0x3}, {0xade, 0x3}, {0x2, 0x1}, {0x9}, {0x6}, {0x101, 0x2}, {0x3, 0x2}], [{0x2}, {0x0, 0x20}, {0x5e0, 0x6}, {0x9d3c, 0x10001}, {0xa6000000000, 0x400}, {0x1, 0x4}, {0x58a, 0x4}, {0x6, 0x80000001}, {0x3, 0x1}, {0x8, 0xff}, {0x8, 0x8}], 0x4, 0x4}, {[{0x800, 0x3}, {0x3, 0x1}, {0x6, 0x3}, {0xff, 0x3}, {0x400000000000, 0x2}, {0x4, 0x3}, {0x100, 0x2}, {0x3, 0x3}, {0x80, 0x3}, {0x1, 0x3}, {0x2, 0x3}], [{0x8, 0xffffffffb0c76bdd}, {0x1f, 0x8}, {0xe5, 0x80}, {0x8, 0x5}, {0x80000000, 0x40}, {0x8, 0x4}, {0x4, 0x7fffffff}, {0x0, 0x1}, {0x8, 0xfffffffffffffffe}, {0x8, 0x1000}, {0x7, 0x1}], 0x9, 0x7}, {[{0xde, 0x1}, {0x4}, {0x82d, 0x1}, {0x6, 0x1}, {0x8, 0x3}, {0x2, 0x3}, {0x24, 0x3}, {0x3a000000000, 0x1}, {0x1, 0x3}, {0x5}, {0xffffffffffff44bf, 0x3}], [{0x7, 0x1f}, {0x19, 0x8}, {0x14}, {0x101, 0x5}, {0x401, 0x143594d5}, {0xa0ae, 0x401}, {0x4, 0x4}, {0x9, 0x80}, {0x533, 0xdfe7}, {0xffffffff, 0x10001}, {0x7, 0x2}], 0x0, 0x3}, {[{0xfff, 0x3}, {0x7fff, 0x3}, {0x2, 0x1}, {0x10000, 0x3}, {0x1}, {0x1f, 0x1}, {0x5, 0x3}, {0x1800000000}, {0x100, 0x2}, {0x0, 0x3}, {0xff, 0x3}], [{0x8, 0x9}, {0x100000000, 0x1}, {0x2, 0x3}, {0x3, 0x10000}, {0x100000001, 0x6}, {0x707, 0x3}, {0x2, 0x1}, {0x8, 0x4}, {0xd2d, 0xfff}, {0x800, 0x8}, {0xffffffffffffffff, 0x7}], 0x5, 0x5}, {[{0x3cc3, 0x3}, {0x3ff, 0x3}, {}, {0x1, 0x3}, {0x100000001, 0x3}, {0x6, 0x1}, {0xaa, 0x3}, {0x6, 0x1}, {0xfffffffffffffffe}, {0x1}, {0x1, 0x2}], [{0x6, 0x1f}, {0x100000000, 0x6}, {0x1, 0x3}, {0x7, 0x3}, {0x7fff, 0x20}, {0xda, 0x1715}, {0x1ff, 0x200}, {0x1}, {0x0, 0x1}, {0xfffffffffffffe01, 0xc745}, {0xfffffffffffffff9, 0x2}], 0x9, 0x4}, {[{0x9a, 0x3}, {0x3}, {0x4}, {0x3}, {0x1, 0x3}, {0x6, 0x3}, {0x1, 0x3}, {0x84b0, 0x3}, {0x7, 0x3}, {0x2}, {0x8, 0x1}], [{0x8, 0x93}, {0x6, 0x7f}, {0x4, 0x9}, {0x40000000}, {0x0, 0x3}, {0xffffffffffffff7f, 0x4}, {0x9, 0x5}, {0xfffffffffffffff7, 0x4}, {0x3, 0x1}, {0xfff, 0x3f}, {0x1f, 0x6}], 0x7, 0x3}], 0x3, 0x1}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x200, 0x1ff, 0x9, 0x815, 0x72ebdb06, 0x8, 0x7, 0xffffffffffffff0b]}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xc08) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:26 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2010000000000000, 0x0) 05:53:26 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:26 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00i!_0x0\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4040, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x400000, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100)=0x7, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x4, 0x4c8, 0x0, 0x140, 0x230, 0x230, 0x140, 0x3f8, 0x3f8, 0x3f8, 0x3f8, 0x3f8, 0x4, &(0x7f0000000080), {[{{@ipv6={@dev={0xfe, 0x80, [], 0x1d}, @mcast1, [0x0, 0xffffff00, 0xffffff00, 0xffffff00], [0xff000000, 0xffffffff, 0xff000000, 0xffffff00], 'vcan0\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x29, 0xf09, 0x4, 0x2}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d2, 0x4d4, 0x8, 0xfffffffffffffffa, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@empty, 'ip6gretap0\x00', 0x5}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0x180, 0x1c8, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0xbf, 0x1f, 0x80000000, 0x3f, 0x81, @mcast1, @rand_addr="5400cd15b6805299a6ad613115174f17", @loopback, [0xffffffff, 0xff, 0xff], [0xffffffff, 0xff, 0xffffffff, 0xffffff00], [0xff, 0xffffffff, 0xffffff00, 0xff000000], 0x2, 0x1000}}, @common=@mh={0x28, 'mh\x00', 0x0, {0xce, 0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast2, 'team0\x00', 0x6}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) [ 2414.541658][ T3841] UBIFS error (pid: 1742): cannot open "ubi", error -22 05:53:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080), 0x4) [ 2414.687510][ T1847] UBIFS error (pid: 1826): cannot open "ubi", error -22 05:53:26 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:26 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2400000000000000, 0x0) [ 2414.710780][ T27] UBIFS error (pid: 1847): cannot open "(null)", error -22 [ 2414.752315][ T27] audit: type=1800 audit(1549605206.150:193): pid=1847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="file0" dev="sda1" ino=16611 res=0 [ 2414.765107][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2414.783809][ C1] UBIFS error (pid: 1847): cannot open "(null)", error -22 [ 2414.785867][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:53:26 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25562000, 0x1000000}], 0x0) [ 2414.861054][ T27] audit: type=1800 audit(1549605206.200:194): pid=1847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="file0" dev="sda1" ino=16611 res=0 05:53:26 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:53:26 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x40802) sendto(r0, &(0x7f0000000180)="d5c09412d10be334db7337ae1b7aca3e9a12ebac06d4b403f5edc85c5ea5a9a40dc6e9b388c436b7800c149f931021ab96f5273f75d0af7148eeab48bc7ec6", 0x146, 0x300000000000001, &(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'gre0\x00'}}, 0x80) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f39, 0x7, &(0x7f00000024c0)=[{&(0x7f0000000100)="3fd50d8ced42b7e70ed9a7b21852aa6d1dbe", 0x12, 0x6a3f}, {&(0x7f00000003c0)="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", 0x1000, 0x4}, {&(0x7f0000000240)="2fd28f31e844a6cc9eede588391278d5634f65c5e0503cf7976b6ee7abb895e3fd42e2a799628451cf7b2180324d1a91a05a01ca7002098c0eec99e9bc164ab31cd95fe0f1a6e60798e15c9dfc535c3233cc3be12f1d73d37616cd1705b79f88e7591d75c7cfda7da1d9a6083838920b21f58472b97547da", 0x78, 0x3}, {&(0x7f0000000140)="aa355ea100303da13207428837c9d67f60e040cc3532267721a468d1e01b0ca15519b157873181", 0x27, 0x6}, {&(0x7f00000002c0)="b13bd2bed3ab4377dd44590db82814b6ddbd562113fb1e332673eebb06c4ac892c54c5d5dd552edce3e8b53863c4dca1e4d9b038632e5fe1d92648a6e69d6661981db017268c0eb6d6966de16f4e82c1e62d85f4303add57bc63d58f443ebbb208c5a83680bfdb5948cd2e6e1019f0d79d71a70c531f2346a53f4d97c2bff7a4a0dcee7e15ea8ef6952e935cd816baf5fa5c", 0x92, 0x8001}, {&(0x7f00000013c0)="ffe25662ed2d73f7c083cf44aed84709bf0c723af4f4f6f74079ff7bcddb6f6b4560cabf7612f0b28c6dba93bb9c3c48c67381f364544009b9f0bffd7072f2bd4cd05ba739fb6b9ed92012fa2b139ece731bb7e58b13f7f8cbee67ff61f63c7a70275785c4ba2d28ba3a82a459e96041fe8c3010c04a453a8f674ec3a74969a3908e4a36940d77ab0f3e326b52c8cce35b404e70f9f8484beb94562d6912e1a6293815ff4fe2ee80280cd500754b707df4a45a5674e5c30b38ec1e9a5580dd8f992656220bbf56ced84c30dba7807f4c5913451d4116a4074c98f0754e89695f55149f9121e427f07f6719b6502b465c9f9492809f9b0a", 0xf7, 0xf2e2}, {&(0x7f00000014c0)="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", 0x1000, 0x2}], 0x800800, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000002580)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f00000025c0)={0x8000000000000000, 0xf000, 0x8, 0x0, 0x1f}) 05:53:26 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:26 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2a00000000000000, 0x0) 05:53:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="3df7ddc7ac9b802a01addef5ca5a1afd260973ed4271d0198103afb18beacf50045b9b9e"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080)={0xff, 0x8, 0x2, 0x200, 0x8, 0xf70, 0x461, 0x4, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={r3, 0x7a, 0x9, [0x2, 0x2, 0x1, 0x6, 0x3ff, 0x8, 0x9, 0x1, 0x22]}, &(0x7f00000002c0)=0x1a) write$sndseq(r1, &(0x7f0000000500)=[{0x2, 0x0, 0x0, 0xfff, @tick=0x10000, {0xfffffffffffffff7, 0xefe}, {0x3ff, 0xf60}, @queue={0x1, {0xf340, 0x100000000}}}, {0x5, 0x8, 0x2, 0x7, @tick=0x4, {0x1, 0x8}, {0xfffffffffffffffa, 0x1}, @raw32={[0x6, 0x1ff, 0x8]}}, {0x7fffffff, 0xfffffffffffeffff, 0x5, 0x2, @tick=0xb7e, {0x1, 0x86}, {0xfffffffffffffffc, 0x8}, @ext={0xb6, &(0x7f0000000440)="1c8b65b236aa31ab5168cb736828e1d66cc4c9b9f526e84fdf5c843f8a38effc4aa1e2896c9d02753cbc44fb9cf538ba2c39ce24cfde4d7fa42f0ff0cd847177cc3d6c708316bf1ea5a1af4d6bdfb7754eb9e8cd987cb607b5aae60fe7a2be16131872c97a2b9d5046c8f1eec9e1cbb06a5c71532fbd75dc8f6b30e22bb97fb8aa3ef581169bbd2d177c6f4e98abdb275341a5f084830031e09e07086897fa7634a09a1cb6f105a29dbf3cc37db212cd91f677e84330"}}, {0x4, 0x8, 0xfe, 0x8, @tick=0x9, {0x8, 0x2}, {0x1, 0x1800000000000}, @raw32={[0xffffffffffffffff, 0x3, 0x6]}}], 0xc0) [ 2415.078366][ T2005] UBIFS error (pid: 2005): cannot open "ubi!_0x0", error -19 [ 2415.144619][ T2005] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=af030000) 05:53:26 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:26 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3000000000000000, 0x0) 05:53:26 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x2) 05:53:26 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, 0x0, 0x0, 0x0) 05:53:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = getegid() syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000440)="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", 0x1000, 0x5}, {&(0x7f0000001440)="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", 0x1000, 0x5}, {&(0x7f0000002440)="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", 0x1000, 0x1}, {&(0x7f0000003440)="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", 0x1000, 0x7fffffff}], 0x82109d, &(0x7f0000004440)={[{@discard_size={'discard', 0x3d, 0x5}}, {@integrity='integrity'}, {@gid={'gid', 0x3d, r2}}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x40}}, {@resize_size={'resize', 0x3d, 0x101}}, {@umask={'umask', 0x3d, 0x4}}], [{@subj_type={'subj_type', 0x3d, '):proc'}}]}) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:26 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3600000000000000, 0x0) 05:53:27 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2556d000, 0x1000000}], 0x0) 05:53:27 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB="060000005f30358789"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='\x00', &(0x7f0000000080)='./file0\x00') 05:53:27 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, 0x0, 0x0, 0x0) 05:53:27 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3c00000000000000, 0x0) 05:53:27 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2415.657585][ T2313] UBIFS error (pid: 2313): cannot open "", error -22 05:53:27 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x3f00000000000000, 0x0) 05:53:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x3) 05:53:27 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, 0x0, 0x0, 0x0) [ 2415.663814][ T3841] UBIFS error (pid: 2313): cannot open "", error -22 05:53:27 executing program 3: mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6465762f3b05bff4891db89e28620e386e6e756c6c623000"], &(0x7f0000000380)='.', &(0x7f0000000080)='ubifs\x00', 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) getsockname(r0, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) 05:53:27 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) ftruncate(r1, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:27 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4800000000000000, 0x0) [ 2415.972574][ T2494] UBIFS error (pid: 2494): cannot open "/dev/;¿ô‰¸ž(b8nnullb0", error -22 05:53:27 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x4c00000000000000, 0x0) [ 2415.981685][ T3841] UBIFS error (pid: 2494): cannot open "/dev/;¿ô‰¸ž(b8nnullb0", error -22 05:53:27 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25662000, 0x1000000}], 0x0) 05:53:27 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:27 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6800000000000000, 0x0) 05:53:27 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="25f7147d1e05106d8e61b0c0fb5423ded841ea2ec5878546df31b483ac0b6cb514fd993d5a9792704507b77a94e915d979ceb32dba61891c76ba0acd2e2ebebf3cd69a11972d9324521221869a3c63119753d036a330b2f7930fd92b3d30eb6df2bc8152318af0f183499d840fbf39892d64ad7b203f3959a3f1f117ccaa11034fe11514b14dd7de8de78116e3c8ebc63132fb4693"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x4) 05:53:27 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x6c00000000000000, 0x0) 05:53:27 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB="00000040000000f000"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x120, r1, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x91}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffff5f6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffc}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1a280000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x70}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @loopback}}]}]}, 0x120}}, 0x200480c4) 05:53:27 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2570f000, 0x1000000}], 0x0) [ 2416.389701][ T3841] UBIFS error (pid: 2728): cannot open "(null)", error -22 05:53:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x6) 05:53:27 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7400000000000000, 0x0) 05:53:28 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) [ 2416.451446][ T3841] UBIFS error (pid: 2728): cannot open "(null)", error -22 05:53:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) fgetxattr(r1, &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f0000000440)=""/4096, 0x1000) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:28 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x530, 0x1b0, 0x0, 0x0, 0x1b0, 0x0, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x274f, 0x96b, @remote, 0x4e22}}}, {{@ip={@loopback, @multicast2, 0x0, 0xffffffff, 'ip6gre0\x00', 'veth1_to_hsr\x00', {}, {0x59d87d025c36727a}, 0xe1b057ccbc44d0a, 0x1, 0x1}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0x5}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x1}}}, {{@ip={@local, @broadcast, 0xff, 0x0, 'veth0_to_hsr\x00', 'lapb0\x00', {0xff}, {0xff}, 0x16, 0x3, 0x10}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x81d4}}}, {{@ip={@multicast1, @local, 0xffffff00, 0xffffff00, 'lapb0\x00', 'vxcan1\x00', {}, {0xff}, 0x3b, 0x2, 0x28}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0xea8553af0ece8b66, 0x4, 0x0, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x1, 0x6}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xd}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x1b}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x590) 05:53:28 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) [ 2416.781158][ T2951] UBIFS error (pid: 2951): cannot open "ubi!_0x0", error -19 [ 2416.788119][ T3841] UBIFS error (pid: 2951): cannot open "ubi!_0x0", error -19 05:53:28 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x7a00000000000000, 0x0) 05:53:28 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x8) 05:53:28 executing program 3: mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2306000000000000d200"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x20) 05:53:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40000, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc8250d267149fe79d550f78094856cd6b162bbbd48435df9b578d78160f5c070000000000"], 0x80) inotify_init1(0x800) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:28 executing program 5: kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) [ 2417.104072][ T3841] UBIFS error (pid: 3144): cannot open "#", error -22 [ 2417.147158][ T3841] UBIFS error (pid: 3144): cannot open "#", error -22 05:53:28 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2586e000, 0x1000000}], 0x0) 05:53:28 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x8cffffff00000000, 0x0) 05:53:28 executing program 5: kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:28 executing program 3: unlink(&(0x7f0000000040)='./file0\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000300)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/143, 0x8f}], 0x2, &(0x7f0000000240)=""/170, 0xaa}, 0x91}], 0x1, 0x40010022, &(0x7f0000000340)) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x4) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:28 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf6ffffff00000000, 0x0) 05:53:28 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25887000, 0x1000000}], 0x0) 05:53:28 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xa) [ 2417.374741][ T3841] UBIFS error (pid: 3290): cannot open "ubi!_0x0", error -19 [ 2417.549042][ T27] audit: type=1804 audit(1549605208.952:195): pid=3400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir932724762/syzkaller.SQw24W/783/file0" dev="sda1" ino=17785 res=1 05:53:29 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xb2, 0x200000) ioctl$KDDELIO(r0, 0x4b35, 0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000080)) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @hyper}, 0x10) 05:53:29 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xf9fdffff00000000, 0x0) 05:53:29 executing program 5: kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) [ 2417.677305][ T27] audit: type=1804 audit(1549605209.062:196): pid=3400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir932724762/syzkaller.SQw24W/783/file0" dev="sda1" ino=17785 res=1 05:53:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000001440)=[{&(0x7f0000000180)=""/199, 0xc7}], 0x1) r2 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r2, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ioctl$sock_netdev_private(r3, 0x89f8, &(0x7f00000002c0)="3424b0b7c157f61d0601e8c9207c271262e7cdaddc590ec207a4cd740a0128992b85063fcfce5821948c984e58b2e5626fdae45812ab5fb2c6a22f63781cae246970c34237af2ee0ab2144aeef94282101ec118688dd129a6a45db9bd637a67cb89f8c3dd1c4a3d52dd6b2acf991c067a6d81e2d812ec94ff2090ebda69be2b1b1a6d9565905e2effbba887e68347651b3d68a6c08445d5e146921a6de7795c688d8e842") write$P9_RREADDIR(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x32a3) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) connect$unix(r2, &(0x7f0000000100)=@abs, 0x6e) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x40111, r3, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000440)=0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000006c0)={@empty, @ipv4={[], [], @remote}, @loopback, 0x3, 0x3, 0x2, 0x100, 0x6, 0x10021, r5}) getresuid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) fchownat(r2, &(0x7f00000004c0)='./file0\x00', r6, r7, 0x1000) syz_open_procfs(r4, &(0x7f0000000480)='net/nfsfs\x00') 05:53:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:29 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfeffffff00000000, 0x0) 05:53:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xc) [ 2417.784830][ T3518] UBIFS error (pid: 3518): cannot open "ubi!_0x0", error -19 [ 2417.796576][ T3841] UBIFS error (pid: 3518): cannot open "ubi!_0x0", error -19 05:53:29 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x258b4000, 0x1000000}], 0x0) 05:53:29 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xffffffff00000000, 0x0) 05:53:29 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000080)) sched_setattr(r1, &(0x7f00000000c0)={0x30, 0x0, 0x1, 0x9fb, 0x700c, 0x92d2, 0x0, 0x10001}, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000100), 0x8) 05:53:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000300)) write$FUSE_POLL(r1, &(0x7f0000000340)={0x18, 0xfffffffffffffffe, 0x1, {0x1}}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2}, &(0x7f00000002c0)=0x8) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r3, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:29 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x258f5000, 0x1000000}], 0x0) 05:53:29 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0xfffffffffffff000, 0x0) [ 2418.146828][ T3752] UBIFS error (pid: 3752): cannot open "ubi!_0x0", error -19 [ 2418.160986][ T3841] UBIFS error (pid: 3752): cannot open "ubi!_0x0", error -19 05:53:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xe) 05:53:29 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:29 executing program 3: mount(&(0x7f0000000480)=ANY=[@ANYBLOB="7500307830341a363536641fca6200000000566e94c9e9ec28a256a07515ec9bb74564f1217786cc64c5bf12f834250ec61e41afbad7fd145c8793e070c8fb8437771c06acf9cfc7e36dbfb3dce302f641ea32d07202b4630a0878038c9064c09c273cc977e494cea5f75698f04e68d4f6c19aa6dec874"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x40, 0x1) getresuid(&(0x7f0000000600), &(0x7f00000005c0)=0x0, &(0x7f0000000540)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00') stat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x2008808, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x5000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[], [{@appraise='appraise'}, {@smackfsroot={'smackfsroot', 0x3d, 'ubifs\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan1selfvmnet1'}}, {@smackfsdef={'smackfsdef', 0x3d, '!'}}]}}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 05:53:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0xa8d13342c801ea79, 0x80, &(0x7f0000000000)={0xa, 0x4e20, 0x1, @ipv4={[], [], @local}}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x157) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:29 executing program 2: mount(&(0x7f0000000080)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x2810, 0x0) 05:53:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000080)={0xe, 0x0, 0x1, 0x0, 0x46, "29fc4d9f2e7bc67cb53b895d7525f6018b2d2ae1b620e03e5712910a8b28d1d782596ee7cbf84e5669a0b3f2b60c32c4097ad8a1e88598336ece93d3aaf314a9c645d196f9fc"}, 0x52) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x400002, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r3 = open(&(0x7f0000000280)='./file0\x00', 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f00000002c0)) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r3, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2418.498599][ T3977] UBIFS error (pid: 3977): cannot open "u", error -22 [ 2418.510455][ T3841] UBIFS error (pid: 3977): cannot open "u", error -22 05:53:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xf) 05:53:30 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25947000, 0x1000000}], 0x0) 05:53:30 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x800) 05:53:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000001f, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000080)) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!_0x0 '], &(0x7f0000000040)='.', &(0x7f0000fdb000)='ubifs\xca', 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x100) getpeername$unix(r2, &(0x7f0000000200), &(0x7f0000000140)=0x6e) 05:53:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6624a324896a01541695292481fda37032f98f930a4221ada111bcd35789e44d04b60c293bbd3738c7369f69e395619d58508eb9538ebd65ea27ada4e3dec49df0bed3998720b918f24ff5af408e419ebdd0fa87bd4f0726ecb3353eb9b0b8514fe62cf04dfcba84e77a29e157fc6d9e605061eddae2a5d62cd8f2c569079b8c618a2f1c4ffe7983a14811253d0541a567d212de4192bc602d5b251c000000"], 0x1}}, 0x4c080) ioctl$KDDISABIO(r1, 0x4b37) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000080)) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:30 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25961000, 0x1000000}], 0x0) 05:53:30 executing program 3: r0 = request_key(&(0x7f0000000100)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='ubi!_0x0\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='\x00', r0) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:30 executing program 5: perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x10) 05:53:30 executing program 5: perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae1ad1bedc444c5e2daf4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78"], 0x80) ftruncate(r2, 0x10099b7) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f00000000c0), &(0x7f00000001c0)=0xc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x280000, 0x0) 05:53:30 executing program 2: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!_0x4\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2419.001502][ T3841] UBIFS error (pid: 4249): cannot open "ubi!_0x0", error -19 [ 2419.162895][ C0] net_ratelimit: 26 callbacks suppressed [ 2419.162932][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2419.174436][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2419.180283][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2419.186138][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2419.192011][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2419.197868][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:53:30 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x259ad000, 0x1000000}], 0x0) 05:53:30 executing program 5: perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:30 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x8, 0x800c, 0x673, 0x0, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0xc0000000000}, &(0x7f0000000100)=0xc) [ 2419.214940][ T4498] UBIFS error (pid: 4498): cannot open "ubi!_0x4", error -19 [ 2419.223461][ T3841] UBIFS error (pid: 4498): cannot open "ubi!_0x4", error -19 05:53:30 executing program 2: mount(&(0x7f0000000040)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) uselib(&(0x7f0000000000)='./file0\x00') ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4) [ 2419.322855][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2419.328726][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:53:30 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b8) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6) [ 2419.402731][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2419.408610][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:53:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x60) 05:53:30 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) [ 2419.497954][ T4575] UBIFS error (pid: 4575): cannot open "ubi!_0x0", error -19 [ 2419.511273][ T3841] UBIFS error (pid: 4575): cannot open "ubi!_0x0", error -19 05:53:31 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x301000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:31 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:31 executing program 2: mount(&(0x7f0000000180)=@loop={'/dev/loop', 0x0}, &(0x7f0000000380)='.', &(0x7f0000000140)='ubifs\x00', 0x2010, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200002, 0x154) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000040)=0x4000000) 05:53:31 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x173, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYRES16=r0], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 05:53:31 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x259c2000, 0x1000000}], 0x0) 05:53:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x300) 05:53:31 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) [ 2419.795444][ T3841] UBIFS error (pid: 4851): cannot open "ubi!_0x0", error -19 05:53:31 executing program 2: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!_0x \x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1, 0x100) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)) write$P9_RLCREATE(r0, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x8, 0x2, 0x6}, 0x8}}, 0x18) 05:53:31 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB="756286215f30783000"], &(0x7f0000000380)='.', &(0x7f0000000080)='u\fcK\xb6\x001\t\x16\xaa\x03\xba\xbaN\x15\xfc\xd1\xa6As\x0f\xe62\x12\x15\xea\x95\x0e\xdfZ:\xd6', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x3) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000000c0)={0x0, {0x15, 0x9}}) 05:53:31 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) [ 2420.105202][ T3841] UBIFS error (pid: 5169): cannot open "ubi!_0x ", error -19 [ 2420.116143][ T3841] UBIFS error (pid: 5169): cannot open "ubi!_0x ", error -19 05:53:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x600) 05:53:31 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:31 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 05:53:31 executing program 2: lsetxattr$security_smack_transmute(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000500)='TRUE', 0x4, 0x1) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0x1d06, 0x4, &(0x7f00000003c0)=[{&(0x7f00000000c0)="04b3bd9a3a919061f2f0b9c50da4960c56a868bde6d15e286d2784d816d0ab3c443b2e052f957284b6c44cfc81e3e393aae56cd3b44060a43c680fe307d24e2560d5bfbf4fe213c7fdbf", 0x4a, 0x9}, {&(0x7f0000000140)="b08046ab910cb315080d130bc56b3db640a4fb4f4366873faacf69782bb195c1dd72ae94c894266668951a632be2d0c50bef4bb356e8f59f391b11e7f49a51b65d716dde5db7e107a38dd968380b31d40c483e8bf52a9d5bb461aed0421331a907720a5a39b46268f1e6da56c38fce37b6d890022a11a3212fdc5edeb488db595ff086711b391e553e1c2ab833139231e5ea2902b9bbd781c1e316", 0x9b, 0x1}, {&(0x7f0000000200)="4648f90f9e9e93adc316063c7946718a4b2e1bd31646d663515923921fa70dfff2b8bfd5f2dd1b1deaa19d06cdc5eb7a3269c46d90b9b0e7f3c75d4f7541fe55b39a99d4ec16df1770566c20f7a97e0a575925", 0x53, 0x3ff}, {&(0x7f0000000280)="aeb6f7e11a2004a419bfd585dee5824744dfb00a983783a70cb8c8106d46312d2a7d64726b104d147303d205ecf16a61dc19a3af225f789f7fbe8c1af1a757d3690385ed11ec7e97d26049e75a6d3bda84f8ffd7e4c83ba7734378c220268274b9c410f180c7fa98a1dfb98db3261b3d79a104d0c4e5f9938c39eef06c57560bfaf2b4c7a2ef65b26039f5bb786f9287512c7d599fcae3e2a4bce81261f6a9950129d722e750f050b37495b6d30552aa18dfeeb5330db8b155", 0xb9, 0x2}], 0x200000, &(0x7f0000000340)='ubi!_0x0\x00') r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000440)={0x5, [0x1, 0x3189, 0x7, 0x6, 0x4]}, 0xe) 05:53:31 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x0, 0x0, 0x0) [ 2420.465484][ T5444] UBIFS error (pid: 5444): cannot open "ubi!_0x0", error -19 [ 2420.473190][ T5423] UBIFS error (pid: 5444): cannot open "ubi!_0x0", error -19 [ 2420.476295][ T3841] UBIFS error (pid: 5423): cannot open "ubi!_0x0", error -19 05:53:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x2) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f00000000c0)={0x30, 0x0, 0x0, 0x3, 0x2e6, 0x7, 0x6, 0x9}, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:32 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25a15000, 0x1000000}], 0x0) 05:53:32 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xa00) 05:53:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x4, 0x448, 0x138, 0x288, 0x288, 0x288, 0x0, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@inet=@tcpmss={0x28, 'tcpmss\x00', 0x0, {0x80200000, 0xffff, 0x1}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x1f, 0x8}}}, {{@uncond, 0x0, 0x128, 0x150, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d6, 0x4d4, 0x6, 0x7fffffff, 0xf3cb14ce38a6d2bc}}, @common=@inet=@udplite={0x30, 'udplite\x00', 0x0, {0x4e20, 0x4e24, 0x4e22, 0x4e22, 0x1}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0xfffffffffffff622, 0x2}}}, {{@ipv6={@rand_addr="6a0e7215aedc7a8dac67d54487161984", @mcast2, [0x0, 0xffffff00, 0xff, 0x99874a8d8724c23b], [0xffffffff, 0xffffff00, 0x0, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {}, {0xff}, 0x66, 0x6, 0x1}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:32 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x0, 0x0, 0x0) [ 2420.812384][ T5700] UBIFS error (pid: 5699): cannot open "(null)", error -22 [ 2420.832495][ T5699] UBIFS error (pid: 5700): cannot open "ubi!_0x0", error -19 05:53:32 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0xffffffffffffff8b, 0x5) r0 = socket$isdn(0x22, 0x3, 0x23) recvmmsg(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000040)=@nl=@proc, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/45, 0x2d}, {&(0x7f0000000200)=""/185, 0xb9}, {&(0x7f0000000580)=""/243, 0xf3}], 0x3, &(0x7f0000000680)=""/169, 0xa9}}, {{&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000740)=""/125, 0x7d}], 0x1, &(0x7f0000000800)=""/201, 0xc9}, 0x3}, {{&(0x7f0000000900)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000000980)=""/129, 0x81}, {&(0x7f0000000a40)=""/130, 0x82}, {&(0x7f0000000b00)=""/23, 0x17}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/255, 0xff}], 0x5}, 0x20}], 0x3, 0x2120, &(0x7f0000001d80)={0x77359400}) write$binfmt_aout(r0, &(0x7f0000001dc0)={{0x108, 0x8001, 0x638, 0x102, 0x3c2, 0x7, 0xd7, 0x200}, "b20bbff0539e646fc0345a9d7a1bc668fdde5d3c6775c8d292b6c09c8ecfb7d25f0545b76245c30a497fcf7e32ad00ad30d0473444216f7179e80dc07bddd451a7a5599ad8ef6e9ff470bf9497cff60bede4ae8703367ec4e0d9a80bf466e1bfaed795b51ca4ac38fc3aaa72bbbf70f0ca0598807a0815a0664129b5f0a213dfa24c5dac5e02abd6a0c4bf415c55d974987f7a91a00a013543d0b50bc8", [[], []]}, 0x2bd) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x400000, 0x0) write$P9_RREADLINK(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x10) 05:53:32 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x0, 0x0, 0x0) [ 2420.841625][ T3841] UBIFS error (pid: 5699): cannot open "(null)", error -22 05:53:32 executing program 2: mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x8000000000, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x12000, 0x0) getdents64(r0, &(0x7f0000000080)=""/202, 0xca) mq_timedsend(r0, &(0x7f0000000180), 0x0, 0x3, &(0x7f00000001c0)) 05:53:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xc00) [ 2421.086391][ T5917] UBIFS error (pid: 5917): cannot open "ubi!_0x0", error -19 [ 2421.093540][ T3841] UBIFS error (pid: 5917): cannot open "ubi!_0x0", error -19 05:53:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) 05:53:32 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x0, &(0x7f0000000180), 0x0) 05:53:32 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x0, &(0x7f0000000180), 0x0) 05:53:32 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25a20000, 0x1000000}], 0x0) 05:53:32 executing program 2: lsetxattr$security_ima(0x0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "350bbb44eabf0606527b5b6a6c002d8b1aa2424d"}, 0x15, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg$kcm(r0, 0x0, 0x10000) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="ab556fcc3fec94", 0x7) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x5f63) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, &(0x7f0000000500)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)={0xe2, 0x1}) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="6c6f636b70726f746f3d6c6f636b5f6e6f6c6f636b2c6c6f636b7461626c653d2f68002c646f6e745f6d6561737572652c00e4653dbd985c3db15bad1ac9af8d73"]) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:32 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000680)='./file0/file0\x00', &(0x7f00000006c0)) getresuid(&(0x7f0000000280), &(0x7f0000000440)=0x0, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="19205d8b5e7add6038296e1c9b4bd6b45496ecd8a0870ead17fd9138a24451aa2ab800", 0x23, 0x3}], 0x0, &(0x7f0000000540)={[{@compress='compress'}, {@ref_verify='ref_verify'}, {@nobarrier='nobarrier'}, {@datacow='datacow'}, {@nodiscard='nodiscard'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0xaf}}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x10001}}, {@noflushoncommit='noflushoncommit'}, {@discard='discard'}], [{@euid_eq={'euid', 0x3d, r0}}, {@euid_lt={'euid<', r1}}, {@hash='hash'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@euid_eq={'euid', 0x3d, r2}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/nullb0\x00'}}, {@hash='hash'}, {@dont_measure='dont_measure'}, {@smackfshat={'smackfshat'}}, {@audit='audit'}]}) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x400, &(0x7f00000000c0)='\x00') mount(&(0x7f0000000300)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00', 0x1001, 0x0) 05:53:32 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x0, &(0x7f0000000180), 0x0) 05:53:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xe00) 05:53:33 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x1000000}], 0x0) 05:53:33 executing program 3: mount(&(0x7f0000000080)=@sg0='ubi!_0x0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x20, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:53:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xf00) 05:53:33 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x1000000}], 0x0) 05:53:33 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x402002, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e22, 0xff, @mcast1, 0x6}}, [0x4, 0x629, 0x3, 0x0, 0xfffffffffffffc00, 0x6, 0x100, 0x1, 0x9, 0x8, 0x8, 0x6, 0x5, 0x21, 0x1000]}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000001c0)={r4, 0x101}, 0x8) ftruncate(r2, 0x10099b7) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x3ff, 0x8000) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:33 executing program 3: mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000140)='.', &(0x7f0000fdb000)='ubifs\x00', 0x80000, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) getpeername(r0, &(0x7f0000000080)=@un=@abs, &(0x7f0000000100)=0x80) 05:53:33 executing program 2: mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="ff3078300000000000332b20dd65419719056b17d23ca4cf5af7263f107e051ee2a7848cbed2ff13bc3d8f6dd31c8ed8a185aa519b146f40b4caa2053613de2cf9de860fc0afab6ba42955f3f3ecf990a9bb9b81af74de478fdc3d8682b372a3f609620a6be8fc0fba9f7b00f3dda9741c6d66f5886ba253922558f016de09ff4d530837cde2279f789c2e5429eda7f490"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:33 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25a2a000, 0x1000000}], 0x0) 05:53:33 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x1000000}], 0x0) [ 2422.280744][ T6675] UBIFS error (pid: 6675): cannot open "ÿ0x0", error -22 [ 2422.320263][ T3841] UBIFS error (pid: 6675): cannot open "ÿ0x0", error -22 05:53:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x3f00) 05:53:33 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x111, 0x4, 0x80, "30c675c31e3d04a8121d477733e0be9c", "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"}, 0x111, 0x3) 05:53:33 executing program 3: rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket(0xa, 0x804, 0x6) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="a3d41515dbef740aba1a7dbc6ec06dd4a49fff90d4e688f63b8a", 0x1a, 0xfffffffffffffffd) keyctl$update(0x2, r1, &(0x7f0000000100)="a22fd6c70cc6686344289566c010ffe78791cb895129ba182dcde0c76100064cdad45cf3e7129b841f89da6682d9e990b6c251a3ae1b3902121f9aadd82350566a1ff3a9820512fc6817", 0x4a) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x7f, 0x4) [ 2422.501522][ T6787] UBIFS error (pid: 6787): cannot open "ubi!_0x0", error -19 05:53:34 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25a95000, 0x1000000}], 0x0) 05:53:34 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r2, r2, 0x0, 0x2088000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 2422.502557][ T3841] UBIFS error (pid: 6787): cannot open "ubi!_0x0", error -19 05:53:34 executing program 2: openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x400, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x44000, 0x46) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) mount(&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000380)='.', &(0x7f0000000040)='ubifs\x00', 0x0, 0x0) 05:53:34 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25b6b000, 0x1000000}], 0x0) 05:53:34 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x4000) 05:53:34 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x1dc, r1, 0xf30, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xdc, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff01}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xef3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}]}, @TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x95}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x23}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ac000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8e0}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffb}]}]}, 0x1dc}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x9) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!_090\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2422.858694][ T7197] UBIFS error (pid: 7105): cannot open "(null)", error -22 05:53:34 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25b70000, 0x1000000}], 0x0) 05:53:34 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000}], 0x0) [ 2422.933594][ T3841] UBIFS error (pid: 7197): cannot open "ubi!_090", error -19 05:53:34 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000940)='/dev/btrfs-control\x00', 0x400400, 0x0) renameat2(r0, &(0x7f0000000a40)='./file0\x00', r0, &(0x7f0000000a80)='./file0\x00', 0x0) getpeername$netrom(r0, &(0x7f0000000980)={{0x3, @default}, [@null, @null, @bcast, @bcast, @remote, @rose, @null]}, &(0x7f0000000a00)=0x48) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x7, &(0x7f00000006c0)=[{&(0x7f00000000c0)="eae04ae142dcdd0187f5afb86ce6513b15f933148f388b2b1df5dc49ff4baa0f494e2995a1cc5bb613d5422de9f25fa303d7f5d0ec9c01495bca04ca00727f06449152822e4806e4ede30466020d176b07e5fe19c0d86536f9c922dca3cf8facb0f7b9b99d69a8f81ef4ee6f1e34ce52088052e2c037d0c178c571721bc8b36fbde3acc0d79cb39ca3803eb4f1ab618eecea77d53aedac70814739eb0a88180cbe319a63593c88f221dff12674786851c611e1b28511f547cf", 0xb9, 0x3}, {&(0x7f0000000180)="98ebe4a1508d624f8b38e9a95fed5c5314637ec948b9edcde798efe5ebf069102701dff418df00ec65195ea114be2fcf018293623979634ab78e4137e8a8a4e9bf0b1f71fe0328b7c8379967bb9a45b0e0c0360a5a481c8e40", 0x59, 0x7}, {&(0x7f0000000200)="c8a43c77585807e008babbdda7714f89c1d0916514174a0542e8aad97218bc3923164d795559993c4e028841531719ad29c298fdd7e67c732c2c7834e017be4a82eb0bb2168546ea58e2c331b0422f33868572922487d6f36e6e0e5709f22fd734b476846666606ea46561a3590707d9aa6dd64ff862937061f80447ad7a0cc10046d85027b5a9e52589ce7aa215b46574dbba94cb9d90dadc5aea47c9cda16294e8226d17a26065c54e0c824af156df83a94ea20d5d54a508be752267f8d1e5c07f", 0xc2, 0x10000}, {&(0x7f00000003c0)="cf89db4134b501ef792878db88ec75afcd0a18303879e7247db708ac12a9b5cdefdab18434b36259c9cd43f90e9eb0816825e98e19b9a755ea96fcaa9d4d5e4d7c76d520868f9f75a34463ff83e0ae8d221d13eeba0563ba81938c5799db1738f954f2ba0cfdb788c392cf5ad141b41091595ed1048d74a4dad9b4e80368dbe4e51a3152d344b6009beaa1b164df352bc37d5b517982b01b135e7f3de9c9b19cf74a689532ae2984632068afbb39a82f6215d80d4b6bfdef0598fe468154655f0754c4e513", 0xc5, 0x8}, {&(0x7f00000004c0)="a2af4865714932c1655c2e9457fe7395aecfcaca097b9720a9e2e7cae2a5e763d82b37c1274bfd6113c22f6a263ec0faf726467267cec886bdcf3855ef5c126e1d0240cbcf57a1e8ff654f6548b6b16bfc67dd9c23457369f64a5a99a98fad4f7cf05cddf943720a1d209804a95730938546875ae155823ca37d38709ea484c991353c44386cdfe547876f948e82454f649d3f50a2e04ce3f03c98c5f4faf7d70e281d4f21a1f9dc7a181c2886c6bb862209db1bcb2c9f0fb2c4c47efe23f64328dbb807e6e347f41b77802d58f3f282ba1f9b13d235cce5134913152f2aa9857fd2738a0f1006a2b949fba3", 0xec}, {&(0x7f00000005c0)="e983792f86370e03fbc6ec147172adcd9a3f1e130f67ffb1b2761e70774484727916b4796548ebcec0b9ded467031ddd22d3fbab6e555e596b31480556073d8cda1b2f52d70c80987f6288d2315bf02b8e20e1da898704a8887ca405f893a7d0bb6de50c075cda1fe430e5468b4857522465f1e7d6fddf6cc8b14bef1215cbfddf28eb99518ec66f3a1107abd59b43bcaac1d92667fd2332a8d69c403ed071fb0ccd13ad149b4976e9bd075dcd3cda4c0c5aba11845dd760167dfca60a80c4f50c", 0xc1, 0x7}, {&(0x7f0000000300)="e6f6cac0c924d38a4340b5bab9c9591aae15facd93908728357dbb04cd84bbed2472bcf2766268acbe30e62386ea760495a9bc824260970b6cdf02ca13a070d2be36aa178ce7b2cf5343e24b3313acb2ded57bd418da4d92b3b47171e6531dff4d9d17d0d4577aaf36f67206f2e8f806e1", 0x71, 0x3d97}], 0x20a080, &(0x7f0000000800)={[{@umask={'umask', 0x3d, 0x7}}, {@session={'session', 0x3d, 0x6e8}}, {@session={'session', 0x3d, 0x4}}, {@iocharset={'iocharset', 0x3d, 'iso8859-7'}}], [{@smackfsroot={'smackfsroot', 0x3d, 'ubifs\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '\'ppp1@'}}, {@fowner_lt={'fowner<', r1}}, {@smackfsdef={'smackfsdef', 0x3d, 'ubifs\x00'}}]}) umount2(&(0x7f0000000900)='./file0\x00', 0xe) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000fdb000)='ramfs\x00', 0x0, 0x0) 05:53:34 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x5865) 05:53:34 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000}], 0x0) 05:53:34 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2423.397208][ T7610] UBIFS error (pid: 7610): cannot open "(null)", error -22 05:53:34 executing program 2: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='TTi!_0x0y'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @loopback}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x4, &(0x7f0000000280)=[{&(0x7f00000000c0)="f3507ba6b70c5713a1b84e9e7cca13c3823cf88fa093916b7ee62c0ed9de452bbd995985f1303995c2cd9b7fe3f2fdf8d82bb101cbbefcf492557997fc658c5ed44b57408f998af3f38d826bc357193cfc0d360cc8", 0x55, 0xe6}, {&(0x7f0000000140)="4a281821bd79473ff680519af168207974ad460437892cd24201535a8f50f6f32eede239db602280d52c1a5524f77d06ee5c324b2956b70a7e133935f5584b6c66ee1250dc9773efb605cb27a7547dfd582dac3d931e4b035d942770d6045413e8e9debef4c60ae19d0511cbabb07076588899cfdea4e6fabbb2883edd6139a521e73a7f2255953d61edf8bccad9e9ed6a09be62f322e9fcf889cb56ef44c029ee8168aaa15492d794d1c4d998754f713c95ccdd0e82048548325fae1309b00127eb2499b9f436aa1455608a0fff34076e229ca3902346bb550d20060e50", 0xde, 0x8}, {&(0x7f00000003c0)="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", 0x1000, 0x1ff}, {&(0x7f0000000240)="3fc29d93c498074f29", 0x9, 0xdab}], 0x800000, &(0x7f00000014c0)={[{@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsv1='jqfmt=vfsv1'}, {@acl='acl'}], [{@dont_hash='dont_hash'}, {@fowner_eq={'fowner', 0x3d, r0}}, {@dont_appraise='dont_appraise'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ubi!_0x0\x00'}}]}) [ 2423.397743][ T3841] UBIFS error (pid: 7610): cannot open "(null)", error -22 05:53:35 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000080)={0x6e, 0x29, 0x2, {0x4, [{{0x60, 0x2, 0x8}, 0x7, 0x80000001, 0x7, './file0'}, {{0xef, 0x1, 0x2}, 0x8, 0x7, 0xd, './file0/file0'}, {{0xe2, 0x0, 0x5}, 0x7fffffff, 0x7, 0x7, './file0'}]}}, 0x6e) write$P9_RREADDIR(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffbae60b9b7ae615c012170bd5645bb3c23d7a91ea64e1e1a161715d0d101d78cce8134a66e4d1c0c83441d9a58fc0bd493a9333e6f8c7ddd2b5293427c6123c0522dced3ced61f47cbae327759830ecae4d8f450646ded57e51e410518bbc82149fe79d550f78094856cd6b162bbbd48435df9b5f8d78882628f806160f5c07"], 0x80) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:53:35 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000}], 0x0) 05:53:35 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80180, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, 'ubifs\x00'}], 0xa, "2840921b399de05fed661f335d85af1bff9b28921b4b7a880baa252ddfcc87815b5e0ff9c2445ea355eeae9a8b17104c82f57da70f9351b26126c038debbc4f35e0ad6157b19741d079f588d7670add46043408cccf649722daf0caf047e7213bfff"}, 0x74) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000180)={{0x1, @broadcast, 0x4e23, 0x0, 'sed\x00', 0x0, 0x1000000000000, 0x59}, {@multicast1, 0x4e22, 0x7, 0x401, 0x3}}, 0x44) ioctl(r1, 0x1000008910, &(0x7f0000000200)="0adc1f023c123f3188a070") getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000240)={'nat\x00', 0x8a, "7e9c320a416b5468ca1bd648fb1d84d7ec8160e5fcc1d981eafdd673658c3a6339fb86971ff91ba7597830190103973cecc50b2836ccd26c1705a401e0c5b24f081280475da782ea8e901c982a233dc55b938e8c185efee14f371b94055bf35651cc330f19243e9297e6022ab93f50c8af30a3870ddade944491395e1f8145b4e9c27b1fb6a5fc5252b6"}, &(0x7f0000000140)=0xae) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000300)={0x9, "56fdc0392f383313169f9e30ec5cad7f7a6df90baceb6c9609b27af47d277059", 0x0, 0x8000, 0x20, 0xb0e0, 0x2}) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) r2 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0xa00000000000000, 0x80, &(0x7f0000000040)=@broute={'broXte\x00', 0x20, 0x1, 0x978, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'bond_slave_0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x8e8, [@among={'among\x00', 0x820, {{0x0, 0xc}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x9f0) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x6000) 05:53:35 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x25b7c000, 0x1000000}], 0x0) [ 2423.608301][ T7651] UBIFS error (pid: 7651): cannot open "TTi!_0x0y", error -22 [ 2423.682897][ T7657] IPVS: set_ctl: invalid protocol: 1 255.255.255.255:20003 [ 2423.710217][ T7651] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2423.737293][ T7657] ebt_among: wrong size: 2080 against expected 1044, rounded to 1048 [ 2423.768246][ T7651] UBIFS error (pid: 7657): cannot open "ubi!_0x0", error -19 05:53:35 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x26c10000, 0x1000000}], 0x0) 05:53:35 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21107000, 0x1000000}], 0x0) [ 2423.793774][ T3841] UBIFS error (pid: 7651): cannot open "TTi!_0x0y", error -22 05:53:35 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x1) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:35 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x480000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000c3cbe608d8dc5b9535b29d725a0897a78869cb120eceb030028d2b5110a7b0280d306728cac81db5a1739fa211bb65cab28c91ae8ccde26c313cc2efbc0542627fc38d0afebd4e8835d39b10ccb8e90ef0879cd57b7346bb3a9f3b105b0bdae86d5289f296dae7a09ba9cd9bc3e3c84c0f30018008a77ead85270c5088520f072eea41040ee54443cce64ab2ef5ef1f1953759b659cb34c661171f5e842534e0be87a80371af900cc269caa67294b649fd7a15b5f5159715df1a"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x40) 05:53:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x6558) 05:53:35 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21107000, 0x1000000}], 0x0) 05:53:35 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x210e1000, 0x1000000}], 0x0) [ 2424.056361][ T8013] UBIFS error (pid: 8014): cannot open "(null)", error -22 [ 2424.076554][ T3841] UBIFS error (pid: 8013): cannot open "ubi!_0x0", error -19 05:53:35 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x26c92000, 0x1000000}], 0x0) 05:53:35 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'user.', 'ubifs\x00'}) 05:53:35 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB="75626921df30783000"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') [ 2424.319631][ T8233] UBIFS error (pid: 8233): cannot open "ubi!_0x0", error -19 05:53:35 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x26cb0000, 0x1000000}], 0x0) 05:53:35 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x210e1000, 0x1000000}], 0x0) [ 2424.324478][ T8234] UBIFS error (pid: 8233): cannot open "ubi!_0x0", error -19 [ 2424.365626][ T3841] UBIFS error (pid: 8234): cannot open "ubi!ß0x0", error -19 05:53:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x8100) 05:53:35 executing program 3: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xfffffffeffffffff, 0x640) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000080)={0x80000001, {{0xa, 0x4e24, 0x2, @ipv4={[], [], @rand_addr=0x757}, 0x5}}}, 0x88) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x0, 0x2, [0x4, 0x20]}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000001c0)={r1, 0x16, "8b59141a775491ed871b1aae8514fea7a5fd00448631"}, &(0x7f0000000200)=0x1e) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) 05:53:35 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x26d63000, 0x1000000}], 0x0) [ 2424.413470][ T3841] UBIFS error (pid: 8234): cannot open "ubi!ß0x0", error -19 05:53:36 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x210e1000, 0x1000000}], 0x0) 05:53:36 executing program 2: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='u\a\x00\x00\x00\x00@\x00\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2424.661612][ T8452] UBIFS error (pid: 8452): cannot open "ubi!_0x0", error -19 [ 2424.668050][ T8462] UBIFS error (pid: 8452): cannot open "ubi!_0x0", error -19 [ 2424.721018][ T3841] UBIFS error (pid: 8462): cannot open "u", error -22 [ 2424.782477][ T3841] UBIFS error (pid: 8462): cannot open "u", error -22 05:53:36 executing program 5 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xff00) 05:53:36 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x26ea4000, 0x1000000}], 0x0) 05:53:36 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21059000, 0x1000000}], 0x0) 05:53:36 executing program 2: mount(&(0x7f0000000280)=ANY=[@ANYBLOB="756269215f05003000c05313142949e3c4d05f41cde4a6218085f6f234b00df3f089c5e237332c5e2458ac465ed233d8b09456d5dd419baa5ec48d9363274f7475549ab229486ad20aa086eb73cb284dd2f26048a7423338725612e6261f74ca09613e9834b4"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000100)="04b1f0c03cfe36d822f00c68588d73bc6eba54e3592661f55e35a48453b40cfeb84aceba644608443d6714425841e9b59069cb60de060ef97391619597bf5e95205ae10f49da7fd4b2ac52876f4003b602943bd9ef8b70cd05", 0x59, 0x4000000, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) 05:53:36 executing program 3: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2006d000, 0x1000000}], 0x0) 05:53:36 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21059000, 0x1000000}], 0x0) [ 2424.979176][ T8572] UBIFS error (pid: 8572): cannot open "ubi!_", error -19 05:53:36 executing program 3: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2006d000, 0x1000000}], 0x0) 05:53:36 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) [ 2425.009399][ T3841] UBIFS error (pid: 8572): cannot open "ubi!_", error -19 05:53:36 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x20, 0x84000) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)=0x3) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x92) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080)={0x2, 0x80000001, 0x4bd, 0x9}, 0x6) 05:53:36 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x21059000, 0x1000000}], 0x0) [ 2425.159875][ C1] net_ratelimit: 26 callbacks suppressed [ 2425.159883][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2425.171464][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:53:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x1000000) 05:53:36 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x10, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:36 executing program 3: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2006d000, 0x1000000}], 0x0) [ 2425.304597][ T8786] UBIFS error (pid: 8786): cannot open "ubi!_0x0", error -19 [ 2425.311885][ T3841] UBIFS error (pid: 8786): cannot open "ubi!_0x0", error -19 05:53:37 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2884b000, 0x1000000}], 0x0) 05:53:37 executing program 4 (fault-call:0 fault-nth:0): mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:37 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x41, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:37 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r0, &(0x7f0000000180)=@nfc={0x27, 0x1, 0x1, 0x1}, 0x80) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000080)={0xc0000000, 0x100, "eacbe0c4fdfce0be4a3c6dac90e2522bb27622c7d946ffac5412da0fdecf7fec", 0x8000, 0x2, 0x1f, 0x7ff, 0x7, 0x1, 0x3, 0x0, [0x1, 0x100000001, 0x4, 0x1]}) 05:53:37 executing program 3 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2425.559631][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2425.565485][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2425.639654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2425.645514][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2425.651399][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2425.657219][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2425.671868][ T9012] UBIFS error (pid: 9012): cannot open "ubi!_0x0", error -19 05:53:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x2000000) 05:53:37 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:37 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x3e00, 0x24484000, 0x1000000}], 0x0) 05:53:37 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 2425.673239][ T3841] UBIFS error (pid: 9012): cannot open "ubi!_0x0", error -19 05:53:37 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x02', 0x0, 0x0) 05:53:37 executing program 2: mount(&(0x7f0000000080)=ANY=[@ANYBLOB="526269215f30ce99356f9e6046783000f2ec408765f13cf3fdd5790a8cfa7fff15a9f3efefc9db666bc326b1feb19450fd7af4f792767eaeadf0a59b48ed48130865a69694520d8535c6b6ddf8979b4532e888c70559fd01c4947ce1ea"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:37 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x3e0000, 0x24484000, 0x1000000}], 0x0) [ 2426.029276][ T9234] UBIFS error (pid: 9234): cannot open "Rbi!_0Ι5ož`Fx0", error -22 [ 2426.045323][ T3841] UBIFS error (pid: 9234): cannot open "Rbi!_0Ι5ož`Fx0", error -22 05:53:37 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x28864000, 0x1000000}], 0x0) 05:53:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x3000000) 05:53:37 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\xf0', 0x0, 0x0) 05:53:37 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x6, 0x1, &(0x7f0000000080), 0x4) 05:53:37 executing program 2: mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="30016f0b5c6a25cc48adb75a6e0126bcb3adb45fc3deeb9a6cd229d604a4d72249d52478993b751e91"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = dup(0xffffffffffffff9c) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000040)) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, 0x3, {0x5}}, 0x18) 05:53:37 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x3e0000000000, 0x24484000, 0x1000000}], 0x0) [ 2426.277766][ T9247] UBIFS error (pid: 9247): cannot open "0o \j%ÌH­·Zn&¼³­´_ÃÞëšlÒ)Ö¤×"IÕ$x™;u‘", error -22 05:53:37 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:37 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x10000000}], 0x0) [ 2426.282874][ T3841] UBIFS error (pid: 9247): cannot open "0o \j%ÌH­·Zn&¼³­´_ÃÞëšlÒ)Ö¤×"IÕ$x™;u‘", error -22 05:53:37 executing program 2: mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ubifs\x00', 0x1882026, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x0) 05:53:37 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x2, &(0x7f0000000080), 0x4) 05:53:38 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\xff', 0x0, 0x0) 05:53:38 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x41000000}], 0x0) 05:53:38 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x28ac4000, 0x1000000}], 0x0) 05:53:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x4000000) 05:53:38 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000080)=0x1000) 05:53:38 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x3e00) 05:53:38 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:38 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x3, &(0x7f0000000080), 0x4) [ 2427.004742][ T9679] UBIFS error (pid: 9679): cannot open "ubi!_0x0", error -19 05:53:38 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:38 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x3e0000) [ 2427.036396][ T3841] UBIFS error (pid: 9679): cannot open "ubi!_0x0", error -19 05:53:38 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x4, &(0x7f0000000080), 0x4) [ 2427.238794][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2427.244627][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:53:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x2, 0xff0000000000, 0xffffffffffffff7f}, {0x5, 0x2, 0xc9, 0x1}, {0xbf, 0x4, 0x4, 0x20}, {0x8, 0x3, 0x6, 0x4}, {0x0, 0x800, 0x1, 0x200}, {0x4, 0x101, 0x80, 0x1}, {0x4, 0x9, 0x8001, 0x1f}, {0x4, 0x0, 0x6d20, 0x5}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x1) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f00000000c0)={0x2, 0x0, [{}, {}]}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000000"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:38 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\xc0', 0x0, 0x0) 05:53:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x6000000) 05:53:39 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x28bca000, 0x1000000}], 0x0) 05:53:39 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x5, &(0x7f0000000080), 0x4) 05:53:39 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x3e0000000000) 05:53:39 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:39 executing program 2: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='_0x0\x00'], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x8000000) 05:53:39 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2427.877340][T10428] UBIFS error (pid: 10428): cannot open "_0x0", error -22 05:53:39 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2a42b000, 0x1000000}], 0x0) [ 2427.883820][ T3841] UBIFS error (pid: 10428): cannot open "_0x0", error -22 05:53:39 executing program 2: r0 = gettid() setpriority(0x2, r0, 0x81) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:39 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:39 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x6, &(0x7f0000000080), 0x4) 05:53:39 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2a5fa000, 0x1000000}], 0x0) 05:53:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xa000000) 05:53:39 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2428.181226][ T3841] UBIFS error (pid: 10632): cannot open "ubi!_0x0", error -19 05:53:39 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x103000) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000040)={0xff, 0x81}) 05:53:39 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2a5ff000, 0x1000000}], 0x0) 05:53:39 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x480000, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) 05:53:39 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:39 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x8, &(0x7f0000000080), 0x4) 05:53:40 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xc000000) 05:53:40 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:40 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0xb, &(0x7f0000000080), 0x4) 05:53:40 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000080)=0x5) mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:40 executing program 5: futex(&(0x7f0000000000)=0x1, 0x4, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x10001, 0x1) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000, 0x1000000}], 0x0) 05:53:40 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:40 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xe000000) 05:53:40 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2429.003081][ T3841] UBIFS error (pid: 11423): cannot open "ubi!_0x0", error -19 05:53:40 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x2a625000, 0x1000000}], 0x0) 05:53:40 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x10, &(0x7f0000000080), 0x4) 05:53:40 executing program 2: mount(&(0x7f0000000000)=@sg0='ubi!_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1, 0x0) mknod(&(0x7f0000003600)='./file0\x00', 0x800, 0xa4ae) chdir(&(0x7f0000000080)='./file0\x00') write$UHID_INPUT(r0, &(0x7f00000057c0)={0x8, "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", 0x11f2}, 0x1006) recvfrom$inet(r0, &(0x7f0000003640)=""/158, 0x9e, 0x10101, &(0x7f0000003700)={0x2, 0x4e22, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000003440)=[{{&(0x7f00000000c0)=@can, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)=""/249, 0xf9}], 0x1, &(0x7f0000000280)=""/198, 0xc6}, 0x1}, {{&(0x7f0000001400)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001480)=""/91, 0x5b}, {&(0x7f0000001500)=""/60, 0x3c}, {&(0x7f0000001540)=""/21, 0x15}, {&(0x7f0000001580)=""/255, 0xff}, {&(0x7f0000001680)=""/250, 0xfa}], 0x5, &(0x7f0000001800)=""/202, 0xca}, 0x7f}, {{&(0x7f0000001900)=@alg, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001980)=""/110, 0x6e}, {&(0x7f0000001a00)=""/234, 0xea}, {&(0x7f0000001b00)=""/88, 0x58}, {&(0x7f0000001b80)=""/252, 0xfc}, {&(0x7f0000001c80)=""/73, 0x49}, {&(0x7f0000001d00)=""/2, 0x2}], 0x6, &(0x7f0000001dc0)=""/211, 0xd3}, 0x9}, {{&(0x7f0000001ec0)=@ipx, 0x80, &(0x7f0000002440)=[{&(0x7f0000001f40)=""/252, 0xfc}, {&(0x7f0000002040)=""/121, 0x79}, {&(0x7f00000020c0)=""/227, 0xe3}, {&(0x7f00000021c0)=""/1, 0x1}, {&(0x7f0000002200)=""/172, 0xac}, {&(0x7f00000022c0)=""/167, 0xa7}, {&(0x7f0000002380)=""/180, 0xb4}], 0x7, &(0x7f00000024c0)=""/225, 0xe1}, 0xf4}, {{&(0x7f00000025c0)=@un=@abs, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002640)=""/64, 0x40}, {&(0x7f0000002680)=""/204, 0xcc}, {&(0x7f0000002780)=""/237, 0xed}, {&(0x7f0000002880)=""/107, 0x6b}, {&(0x7f0000002900)=""/101, 0x65}, {&(0x7f0000002980)=""/203, 0xcb}, {&(0x7f0000002a80)=""/35, 0x23}, {&(0x7f0000002ac0)=""/239, 0xef}, {&(0x7f0000002bc0)=""/142, 0x8e}], 0x9, &(0x7f0000002d40)=""/14, 0xe}, 0x5}, {{&(0x7f0000002d80)=@isdn, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002e00)=""/204, 0xcc}, {&(0x7f0000002f00)=""/42, 0x2a}], 0x2, &(0x7f0000002f80)=""/154, 0x9a}, 0x3}, {{&(0x7f0000003040)=@alg, 0x80, &(0x7f0000003380)=[{&(0x7f00000030c0)=""/130, 0x82}, {&(0x7f0000003180)=""/194, 0xc2}, {&(0x7f0000003280)=""/121, 0x79}, {&(0x7f0000003300)=""/84, 0x54}], 0x4, &(0x7f00000033c0)=""/90, 0x5a}}], 0x7, 0x20, 0x0) 05:53:40 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x8000000000000000, 0xfffffffffffffffd, 0x0, 0x7f, 0xc00, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000000000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1a7, &(0x7f0000000180)=[{0x0, 0xfe31, 0x24484000, 0x1000000}], 0x3) 05:53:40 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 05:53:40 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0xf000000) 05:53:40 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) kexec_load(0x5050ca0c000000, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x24484000}], 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000040)={0x0, {0x4, 0x4, 0x80000000, 0x4a}}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @multicast2}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r2, 0x100000000}, 0x8) 05:53:40 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi!'], 0x0, &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 2429.503326][T11894] UBIFS error (pid: 11894): cannot open "ubi!_0x0", error -19 [ 2429.529027][ T3841] UBIFS error (pid: 11894): cannot open "ubi!_0x0", error -19 [ 2429.648644][T12152] WARNING: CPU: 0 PID: 12152 at drivers/media/platform/vicodec/vicodec-core.c:151 get_q_data+0x53/0x80 [ 2429.660188][T12152] Kernel panic - not syncing: panic_on_warn set ... [ 2429.666802][T12152] CPU: 0 PID: 12152 Comm: syz-executor5 Not tainted 5.0.0-rc5-next-20190207 #30 [ 2429.675831][T12152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2429.685890][T12152] Call Trace: [ 2429.689216][T12152] dump_stack+0x172/0x1f0 [ 2429.693565][T12152] ? vidioc_try_fmt_vid_cap+0x770/0x810 [ 2429.699115][T12152] panic+0x2cb/0x65c [ 2429.703014][T12152] ? __warn_printk+0xf3/0xf3 [ 2429.707622][T12152] ? get_q_data+0x53/0x80 [ 2429.711959][T12152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2429.718204][T12152] ? __warn.cold+0x5/0x45 [ 2429.722546][T12152] ? get_q_data+0x53/0x80 [ 2429.726880][T12152] __warn.cold+0x20/0x45 [ 2429.731166][T12152] ? get_q_data+0x53/0x80 [ 2429.735526][T12152] report_bug+0x263/0x2b0 [ 2429.739875][T12152] do_error_trap+0x11b/0x200 [ 2429.744495][T12152] do_invalid_op+0x37/0x50 05:53:41 executing program 2: mount(&(0x7f0000000000)=ANY=[@ANYBLOB="bce0178e575dd7c400"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xed, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f00000003c0)=0xe8) syz_emit_ethernet(0x78, &(0x7f0000001740)={@empty, @local, [], {@llc_tr={0x11, {@llc={0xfe, 0xfe, "d3", "ee4ae476ba6a3bd60066c1815c18ed69dd399f43bb8854b537e2bfc51106d5e8cc62246114a4f0c137f64a29a9266c95321f3442d2ef44b19c1b69b16fbbb384d1a7a538d67f15507117c51595464650eb1f343b9b91bd8cb184ff640ea6c48623ec261dd6fe67"}}}}}, &(0x7f0000001680)={0x0, 0x1, [0xe58, 0x5b, 0xe5c, 0xa4c]}) fcntl$getflags(r1, 0x811) sendmsg$xdp(r0, &(0x7f0000001700)={&(0x7f0000000500)={0x2c, 0x2, r2, 0x16}, 0x10, &(0x7f00000016c0)=[{&(0x7f0000000540)="6f1aedd926a8c0dc1a8430e90c4397b8a3c99a29c91956c6b4059476cce8b152a600d461b32f64d4a70c90829fe45cb7c1317b11de7ad3ba13", 0x39}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="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", 0xfc}, {&(0x7f0000001680)}], 0x4, 0x0, 0x0, 0x40}, 0x8000) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x80000, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@access_uid={'access', 0x3d, r3}}, {@cache_none='cache=none'}, {@msize={'msize', 0x3d, 0x8}}, {@access_client='access=client'}, {@afid={'afid', 0x3d, 0x2}}, {@loose='loose'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_lt={'euid<', r4}}, {@permit_directio='permit_directio'}]}}) [ 2429.748927][T12152] ? get_q_data+0x53/0x80 [ 2429.753271][T12152] invalid_op+0x14/0x20 [ 2429.757431][T12152] RIP: 0010:get_q_data+0x53/0x80 [ 2429.762377][T12152] Code: 74 3a 83 fb 02 75 1e e8 9b 23 b7 fc 49 81 c4 70 02 00 00 e8 8f 23 b7 fc 4c 89 e0 5b 41 5c 5d c3 83 fb 0a 74 e2 e8 7d 23 b7 fc <0f> 0b e8 76 23 b7 fc 45 31 e4 5b 4c 89 e0 41 5c 5d c3 e8 66 23 b7 [ 2429.781988][T12152] RSP: 0018:ffff88808229f918 EFLAGS: 00010216 [ 2429.787973][ T3841] kobject: 'loop2' (00000000f26c4c00): kobject_uevent_env [ 2429.788056][T12152] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90010860000 [ 2429.788072][T12152] RDX: 00000000000000a7 RSI: ffffffff84b923f3 RDI: 0000000000000005 [ 2429.788083][T12152] RBP: ffff88808229f928 R08: ffff8880809b8700 R09: ffffed100987d911 [ 2429.788094][T12152] R10: ffffed100987d910 R11: ffff88804c3ec883 R12: ffff88807e0a6480 [ 2429.788104][T12152] R13: 0000000000000002 R14: ffff88807e0a6480 R15: ffffffff87e21580 [ 2429.788135][T12152] ? get_q_data+0x53/0x80 [ 2429.795290][ T3841] kobject: 'loop2' (00000000f26c4c00): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2429.803203][T12152] ? get_q_data+0x53/0x80 [ 2429.803220][T12152] vidioc_s_selection+0x9b/0x3e0 [ 2429.803239][T12152] v4l_s_crop+0x224/0x370 [ 2429.803256][T12152] ? v4l_log_status+0xf0/0xf0 [ 2429.803283][T12152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2429.803297][T12152] ? v4l2_prio_max+0x118/0x150 [ 2429.803319][T12152] __video_do_ioctl+0x7f1/0xce0 [ 2429.803346][T12152] ? v4l_s_fmt+0xb40/0xb40 [ 2429.803368][T12152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2429.803384][T12152] ? _copy_from_user+0xdd/0x150 [ 2429.803405][T12152] video_usercopy+0x4c5/0x10d0 [ 2429.803421][T12152] ? v4l_s_fmt+0xb40/0xb40 [ 2429.803443][T12152] ? v4l_enumstd+0x70/0x70 [ 2429.803461][T12152] ? perf_trace_lock+0xeb/0x510 [ 2429.803473][T12152] ? mark_held_locks+0xf0/0xf0 [ 2429.803493][T12152] ? zap_class+0x460/0x460 [ 2429.803516][T12152] ? __fget+0x340/0x540 [ 2429.803539][T12152] ? video_usercopy+0x10d0/0x10d0 [ 2429.803554][T12152] video_ioctl2+0x2d/0x35 [ 2429.803572][T12152] v4l2_ioctl+0x156/0x1b0 [ 2429.803587][T12152] ? video_devdata+0xa0/0xa0 05:53:41 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x11, &(0x7f0000000080), 0x4) [ 2429.803606][T12152] do_vfs_ioctl+0xd6e/0x1390 [ 2429.803630][T12152] ? ioctl_preallocate+0x210/0x210 [ 2429.803655][T12152] ? __fget+0x367/0x540 [ 2429.803686][T12152] ? ksys_dup3+0x3e0/0x3e0 [ 2429.803702][T12152] ? nsecs_to_jiffies+0x30/0x30 [ 2429.803731][T12152] ? security_file_ioctl+0x93/0xc0 [ 2429.803751][T12152] ksys_ioctl+0xab/0xd0 [ 2429.803773][T12152] __x64_sys_ioctl+0x73/0xb0 [ 2429.803800][T12152] do_syscall_64+0x103/0x610 [ 2429.937834][ T3841] kobject: 'loop3' (00000000b80d8f26): kobject_uevent_env [ 2429.941006][T12152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.959088][ T3841] kobject: 'loop3' (00000000b80d8f26): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2429.959567][T12152] RIP: 0033:0x457e39 [ 2429.959584][T12152] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2429.959594][T12152] RSP: 002b:00007fa379470c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2429.959610][T12152] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 2429.959619][T12152] RDX: 0000000020000040 RSI: 000000004014563c RDI: 0000000000000004 [ 2429.959629][T12152] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2429.959645][T12152] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa3794716d4 [ 2430.047059][T12204] UBIFS error (pid: 12204): cannot open "¼àŽW]×Ä", error -22 [ 2430.057606][T12152] UBIFS error (pid: 12204): cannot open "¼àŽW]×Ä", error -22 [ 2430.062403][T12152] R13: 00000000004c2e32 R14: 00000000004d5958 R15: 00000000ffffffff [ 2430.071512][T12152] Kernel Offset: disabled [ 2430.106585][T12152] Rebooting in 86400 seconds..