[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.245' (ECDSA) to the list of known hosts. 2020/12/16 05:56:22 fuzzer started 2020/12/16 05:56:23 dialing manager at 10.128.0.105:33803 2020/12/16 05:56:23 syscalls: 3308 2020/12/16 05:56:23 code coverage: enabled 2020/12/16 05:56:23 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2020/12/16 05:56:23 extra coverage: extra coverage is not supported by the kernel 2020/12/16 05:56:23 setuid sandbox: enabled 2020/12/16 05:56:23 namespace sandbox: enabled 2020/12/16 05:56:23 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/16 05:56:23 fault injection: enabled 2020/12/16 05:56:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/16 05:56:23 net packet injection: enabled 2020/12/16 05:56:23 net device setup: enabled 2020/12/16 05:56:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/12/16 05:56:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/16 05:56:23 USB emulation: /dev/raw-gadget does not exist 2020/12/16 05:56:23 hci packet injection: enabled 2020/12/16 05:56:23 wifi device emulation: kernel 4.17 required (have 4.14.212-syzkaller) 05:57:41 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 05:57:41 executing program 1: waitid(0x2, 0x0, 0x0, 0x8, 0xffffffffffffffff) 05:57:41 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000014c0)={0x18, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff90}, [@generic={0x4, 0x0, 0x0, 0x0, 0xffff}]}, &(0x7f0000000400)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 05:57:41 executing program 2: mq_open(&(0x7f0000000080)='-\x00', 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x989680}, 0x0) 05:57:41 executing program 3: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c09425, 0x0) 05:57:41 executing program 4: syz_mount_image$tmpfs(&(0x7f0000001040)='tmpfs\x00', &(0x7f0000001080)='./file0\x00', 0x0, 0x0, &(0x7f0000002300), 0x0, &(0x7f0000002380)={[{@nr_blocks={'nr_blocks', 0x3d, [0x36, 0x0]}}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '({,\x88%&]{-])%$-.:'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<'}}]}) syzkaller login: [ 108.521366] IPVS: ftp: loaded support on port[0] = 21 [ 108.661301] IPVS: ftp: loaded support on port[0] = 21 [ 108.753998] chnl_net:caif_netlink_parms(): no params data found [ 108.783501] IPVS: ftp: loaded support on port[0] = 21 [ 108.859540] chnl_net:caif_netlink_parms(): no params data found [ 108.913985] IPVS: ftp: loaded support on port[0] = 21 [ 108.951873] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.959109] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.967274] device bridge_slave_0 entered promiscuous mode [ 108.998817] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.005294] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.013695] device bridge_slave_1 entered promiscuous mode [ 109.060297] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.067905] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.075588] device bridge_slave_0 entered promiscuous mode [ 109.085648] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.092379] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.099245] device bridge_slave_1 entered promiscuous mode [ 109.120817] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.143678] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 109.151376] chnl_net:caif_netlink_parms(): no params data found [ 109.154702] IPVS: ftp: loaded support on port[0] = 21 [ 109.165843] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.175390] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 109.210294] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 109.217789] team0: Port device team_slave_0 added [ 109.239865] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 109.247344] team0: Port device team_slave_1 added [ 109.261826] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 109.269847] team0: Port device team_slave_0 added [ 109.290682] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 109.298106] team0: Port device team_slave_1 added [ 109.322645] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 109.328893] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 109.354845] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 109.400826] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 109.407967] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 109.433233] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 109.445994] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 109.454607] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 109.460834] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 109.486264] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 109.511077] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 109.540602] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 109.547638] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 109.574081] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 109.587643] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 109.599338] device hsr_slave_0 entered promiscuous mode [ 109.599450] IPVS: ftp: loaded support on port[0] = 21 [ 109.610612] device hsr_slave_1 entered promiscuous mode [ 109.617807] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 109.649079] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 109.657809] chnl_net:caif_netlink_parms(): no params data found [ 109.669379] device hsr_slave_0 entered promiscuous mode [ 109.675849] device hsr_slave_1 entered promiscuous mode [ 109.682752] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 109.693498] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 109.716360] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 109.765816] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.773381] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.781175] device bridge_slave_0 entered promiscuous mode [ 109.855361] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.861735] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.869957] device bridge_slave_1 entered promiscuous mode [ 109.921431] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.944800] chnl_net:caif_netlink_parms(): no params data found [ 109.958941] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 109.999672] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 110.007402] team0: Port device team_slave_0 added [ 110.039173] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 110.049658] team0: Port device team_slave_1 added [ 110.122290] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 110.128558] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.154773] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 110.168411] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 110.174922] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.200214] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 110.218143] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.224892] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.231738] device bridge_slave_0 entered promiscuous mode [ 110.259428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 110.267227] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 110.289852] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 110.297804] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.309899] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.317220] device bridge_slave_1 entered promiscuous mode [ 110.358080] device hsr_slave_0 entered promiscuous mode [ 110.363909] device hsr_slave_1 entered promiscuous mode [ 110.391362] chnl_net:caif_netlink_parms(): no params data found [ 110.407636] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 110.442717] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 110.450795] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 110.460736] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.467526] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.474920] device bridge_slave_0 entered promiscuous mode [ 110.481387] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.487817] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.495120] device bridge_slave_1 entered promiscuous mode [ 110.507479] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 110.515737] Bluetooth: hci0 command 0x0409 tx timeout [ 110.521080] Bluetooth: hci1 command 0x0409 tx timeout [ 110.558512] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 110.569749] team0: Port device team_slave_0 added [ 110.592018] Bluetooth: hci2 command 0x0409 tx timeout [ 110.598035] Bluetooth: hci4 command 0x0409 tx timeout [ 110.604788] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 110.612596] Bluetooth: hci3 command 0x0409 tx timeout [ 110.616940] team0: Port device team_slave_1 added [ 110.617846] Bluetooth: hci5 command 0x0409 tx timeout [ 110.652133] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 110.669070] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 110.676688] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 110.683757] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.709417] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 110.720747] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 110.727547] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.753361] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 110.765474] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 110.790798] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.797712] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 110.828930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 110.857236] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 110.864605] team0: Port device team_slave_0 added [ 110.870141] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 110.877688] team0: Port device team_slave_1 added [ 110.892986] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.899331] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.908184] device bridge_slave_0 entered promiscuous mode [ 110.916469] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 110.944911] device hsr_slave_0 entered promiscuous mode [ 110.951110] device hsr_slave_1 entered promiscuous mode [ 110.958698] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 110.967858] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.974293] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.981148] device bridge_slave_1 entered promiscuous mode [ 110.989503] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 110.997576] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 111.004053] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 111.029681] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 111.040267] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 111.047110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.054705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.079039] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 111.088526] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 111.097626] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 111.103975] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 111.129594] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 111.140373] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 111.158072] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 111.164309] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.178921] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 111.192804] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 111.199982] team0: Port device team_slave_0 added [ 111.207145] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 111.224704] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 111.232847] team0: Port device team_slave_1 added [ 111.254119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.274591] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 111.280839] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 111.307046] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 111.331222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.339526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.348488] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.354972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.363885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.375214] device hsr_slave_0 entered promiscuous mode [ 111.380859] device hsr_slave_1 entered promiscuous mode [ 111.387037] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 111.395010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 111.401242] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 111.427095] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 111.439377] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 111.455182] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.462587] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 111.469434] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 111.492871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.503809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.511484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.519938] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.526337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.551244] device hsr_slave_0 entered promiscuous mode [ 111.557163] device hsr_slave_1 entered promiscuous mode [ 111.572236] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 111.581041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.593596] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 111.601568] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 111.618888] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 111.639560] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 111.658739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.671969] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 111.685528] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 111.716347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.723776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.730541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.738643] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.746547] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.763875] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.771345] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 111.777731] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.801433] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 111.816170] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 111.826192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.835547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.872353] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 111.883321] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 111.889399] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.896906] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.909423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 111.916609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.923836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.930604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.938605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.946260] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.952650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.959576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.967628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.994125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 112.004602] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.015391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.024591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.032478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.041515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.050380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.063006] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 112.069020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 112.078789] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.086819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.095049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.102919] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.109260] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.116460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.125406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.133105] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.139456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.146722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.158280] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.177541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.188121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.198924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.207241] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.213644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.220465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.229978] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 112.240357] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 112.253905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.263200] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 112.269894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 112.276988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.285635] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 112.304955] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 112.314876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.323413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.330989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 112.339493] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 112.348788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 112.361052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.369933] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.390800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 112.399114] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.417288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 112.426590] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.433769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 112.441310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.449174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.456838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 112.464902] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 112.478664] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 112.486543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 112.496947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 112.504499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 112.516904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.525114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.533133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.540559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.548131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.558537] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 112.566764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.576502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.584806] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 112.591906] Bluetooth: hci1 command 0x041b tx timeout [ 112.592547] Bluetooth: hci0 command 0x041b tx timeout [ 112.599828] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 112.608722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 112.623834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 112.633318] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 112.644593] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 112.650599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 112.659566] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 112.670498] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 112.677099] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.682039] Bluetooth: hci5 command 0x041b tx timeout [ 112.688378] Bluetooth: hci3 command 0x041b tx timeout [ 112.688418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.693761] Bluetooth: hci4 command 0x041b tx timeout [ 112.693775] Bluetooth: hci2 command 0x041b tx timeout [ 112.712558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.719948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.727373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.738488] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 112.750300] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 112.763522] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 112.770505] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.782164] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 112.788847] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 112.796042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.804794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.812487] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.818843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.831253] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.844379] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 112.854172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.870541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.880102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.892551] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 112.899262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 112.908858] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 112.919227] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.928607] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.942249] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 112.949106] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 112.961140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.970341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.978237] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.984652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.993918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.000733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.012567] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 113.021093] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 113.031462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 113.040313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 113.049018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.065703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.078366] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 113.085406] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.092771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 113.102225] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 113.108714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.118651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.126656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.136571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.152433] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 113.158746] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.169924] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 113.177382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.186057] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.194862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 113.207327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 113.216806] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 113.229941] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 113.237156] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 113.244707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.253067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.260602] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.266979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.275488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.283812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.291587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.299389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.307277] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.313690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.320833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 113.328694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.336844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.343962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.353680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 113.369661] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 113.377158] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 113.386704] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 113.394676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.408716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.417372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 113.428498] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 113.437144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.446414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.455993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.464438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.472572] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.478959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.488669] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 113.496613] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 113.503759] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 113.510756] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 113.519832] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 113.530731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 113.540046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.547924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.556270] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.562666] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.569472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.577540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.585061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.593813] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 113.599832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 113.612131] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 113.620786] device veth0_vlan entered promiscuous mode [ 113.629541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 113.639800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.646976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.655193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.662942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.670313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.679157] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.686195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.695160] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 113.703154] device veth0_vlan entered promiscuous mode [ 113.718443] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.726341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 113.735648] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 113.748314] device veth1_vlan entered promiscuous mode [ 113.756564] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 113.766535] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 113.774577] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 113.784662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.792586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.800040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.808055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 113.815873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.825733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 113.846590] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 113.854450] device veth1_vlan entered promiscuous mode [ 113.860434] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 113.869214] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 113.879722] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 113.887275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.895228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.904086] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 113.910750] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 113.919590] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 113.929149] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 113.943721] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 113.953922] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 113.961375] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 113.970299] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 113.977900] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 113.986002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.993882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.001288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.010530] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 114.026353] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 114.034323] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 114.040886] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 114.049838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.058496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.066660] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 114.077450] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 114.088098] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 114.097570] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 114.106363] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 114.115656] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 114.125605] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 114.138677] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 114.146061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.154525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.162647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.170041] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.177789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 114.185413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.193119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 114.200598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.208403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 114.216026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.225772] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 114.235320] device veth0_vlan entered promiscuous mode [ 114.247522] device veth0_macvtap entered promiscuous mode [ 114.256620] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 114.264150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.270990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.280022] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 114.288079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.295635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.303744] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 114.309740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 114.319446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 114.327435] device veth0_macvtap entered promiscuous mode [ 114.333900] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 114.343349] device veth1_macvtap entered promiscuous mode [ 114.349416] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 114.357356] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 114.368698] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 114.376528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.384639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.396464] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 114.435267] device veth1_macvtap entered promiscuous mode [ 114.442403] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 114.452490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 114.460643] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 114.469128] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 114.475937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 114.484027] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 114.492880] device veth1_vlan entered promiscuous mode [ 114.498639] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 114.508505] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 114.516050] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 114.523676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 114.530364] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 114.545626] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 114.555202] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 114.563616] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 114.572963] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 114.582366] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 114.594586] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 114.602111] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 114.611489] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 114.618347] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 114.628066] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 114.636124] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 114.644020] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 114.652173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.659800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 114.668106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.676483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 114.683269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 114.690428] Bluetooth: hci0 command 0x040f tx timeout [ 114.694490] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 114.695876] Bluetooth: hci1 command 0x040f tx timeout [ 114.708023] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 114.717903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.728293] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 114.735567] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 114.745576] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 114.753215] Bluetooth: hci5 command 0x040f tx timeout [ 114.762231] Bluetooth: hci2 command 0x040f tx timeout [ 114.767464] Bluetooth: hci4 command 0x040f tx timeout [ 114.767635] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 114.773847] Bluetooth: hci3 command 0x040f tx timeout [ 114.788070] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 114.797738] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 114.805778] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 114.814881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.823297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 114.830964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.839686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 114.847762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.857161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 114.867429] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.877547] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 114.884486] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 114.898297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 114.906432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.927336] device veth0_macvtap entered promiscuous mode [ 114.936532] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 114.948950] device veth1_macvtap entered promiscuous mode [ 114.961396] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 114.985436] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 114.999459] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 115.012883] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 115.019770] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 115.030368] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 115.040675] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 115.056960] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.077573] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 115.087448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.098117] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 115.105764] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 115.114877] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 115.124777] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 115.133599] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 115.140668] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.150810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.159093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.167196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.175290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.186131] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.195634] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 115.210386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.220149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 115.230253] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.240798] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 115.248886] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 115.260434] device veth0_vlan entered promiscuous mode [ 115.276127] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.289930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.316335] device veth1_vlan entered promiscuous mode [ 115.326902] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 115.342583] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 115.367269] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 115.378832] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 115.390261] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 115.398718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 115.407237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.419888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 115.431882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.442423] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 115.451925] device veth0_macvtap entered promiscuous mode [ 115.457999] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 115.467217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 115.479793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.498800] device veth1_macvtap entered promiscuous mode [ 115.505775] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 115.522237] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 115.529684] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 115.540945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 115.552522] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 115.559507] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 115.574414] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 115.584101] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 115.600069] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 115.607799] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 115.621098] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 115.632283] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 115.645118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 05:57:49 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000001f80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)='V', 0x1}, {&(0x7f0000000280)='a', 0x1}, {0x0}, {&(0x7f0000000380)='+', 0x1}], 0x4}}], 0x1, 0x0) [ 115.653332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.664559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 115.675368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.688874] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 05:57:50 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000001080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x400) [ 115.700087] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.713510] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 115.734766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.747294] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready 05:57:50 executing program 0: r0 = gettid() waitid(0x2, r0, 0x0, 0x40000004, 0x0) [ 115.756131] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 115.776546] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 115.786335] device veth0_vlan entered promiscuous mode [ 115.795413] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 05:57:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x0, 0x0, 0x20, 0x0, 0x1}, 0x40) [ 115.804092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.812367] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.826771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.835330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.844720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 05:57:50 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x3, &(0x7f00000001c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, 0x0]) 05:57:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 115.854708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 115.884664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 05:57:50 executing program 0: clone(0xd4283080, 0x0, 0x0, 0x0, 0x0) [ 115.907898] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 115.927324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.945292] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 115.963959] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.976714] IPVS: ftp: loaded support on port[0] = 21 [ 115.978176] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 115.991539] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 116.005615] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 05:57:50 executing program 1: ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, 0x0) getrusage(0x1, &(0x7f0000000000)) [ 116.012922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.020502] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.035131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.053218] device veth0_vlan entered promiscuous mode [ 116.062729] device veth1_vlan entered promiscuous mode [ 116.068818] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 116.081147] device veth1_vlan entered promiscuous mode [ 116.090759] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 116.109785] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 116.140242] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 116.150968] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 116.162514] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 116.169581] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 116.177689] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 116.190580] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 116.215902] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready 05:57:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x20}, 0x0) [ 116.235140] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 116.256153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.264564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.275148] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 116.291968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.300481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.319199] device veth0_macvtap entered promiscuous mode [ 116.332805] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 116.346625] device veth0_macvtap entered promiscuous mode [ 116.355224] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 116.376166] device veth1_macvtap entered promiscuous mode [ 116.384352] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 116.393250] device veth1_macvtap entered promiscuous mode [ 116.399292] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 116.414108] IPVS: ftp: loaded support on port[0] = 21 [ 116.424778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 116.435354] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 116.467918] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 116.476699] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 116.499659] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 116.515285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.524490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 116.534532] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.543772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 116.553527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.563401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 116.573178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.583649] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 116.590649] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 116.598429] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 116.609775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.618955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 116.629052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.638466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 116.648211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.657358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 116.667439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.677114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 116.687046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.697576] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 116.705588] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 116.721656] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 116.728909] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.736686] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 116.744128] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.751153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.758886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.767269] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.775379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.787284] Bluetooth: hci1 command 0x0419 tx timeout [ 116.792802] Bluetooth: hci0 command 0x0419 tx timeout [ 116.796289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.808249] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.817732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.827509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.837236] Bluetooth: hci4 command 0x0419 tx timeout [ 116.839181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.842859] Bluetooth: hci2 command 0x0419 tx timeout [ 116.842896] Bluetooth: hci5 command 0x0419 tx timeout [ 116.863144] Bluetooth: hci3 command 0x0419 tx timeout [ 116.864682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.877485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.887292] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.897450] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 116.904695] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 116.917156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.927652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.937948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.947999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.957412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.967163] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.976323] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.986062] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.996048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 117.005814] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.016402] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 117.023543] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 117.036133] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 117.045175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 117.053655] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 117.061997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 05:57:51 executing program 2: r0 = socket(0x2, 0x3, 0xc) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@caif, 0x80) 05:57:51 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:57:51 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) 05:57:51 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1263, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0}) 05:57:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r1) 05:57:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x290}, 0x0) 05:57:51 executing program 1: clock_gettime(0x6, &(0x7f0000000180)) 05:57:51 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x5}]}) [ 117.362723] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 05:57:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x18, 0x0, r0) 05:57:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000040), 0x4) 05:57:51 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2008410, &(0x7f0000000900)=ANY=[@ANYBLOB='mpol=default=static,mpol=default=relative,huge=advise,mode=00000000000000000000000,mode=00000000000000000000000,mpol=local,gid=', @ANYRESHEX=0xee01]) 05:57:51 executing program 1: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair(0x0, 0x8000c, 0x0, &(0x7f0000000080)) 05:57:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r1) 05:57:51 executing program 4: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080), 0x0) 05:57:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x2, 0x4e21, @local}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x83, 0x2}]}}}], 0x18}, 0x0) 05:57:51 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x20cd02, 0x0) 05:57:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x10}}, @ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x86, 0x2}]}}}], 0x28}, 0x0) 05:57:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8953, &(0x7f00000000c0)={'gre0\x00', 0x0}) 05:57:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r1) 05:57:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:57:51 executing program 0: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0xf00004a7) 05:57:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r1) 05:57:51 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xd, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 05:57:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f00000001c0)={0x2, 0x4e21, @empty}, 0x10, 0x0}, 0x24043f10) 05:57:51 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x5460, 0x0) 05:57:52 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40020, &(0x7f0000000300)) 05:57:52 executing program 2: add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) 05:57:52 executing program 3: memfd_create(0x0, 0x8004) 05:57:52 executing program 1: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000002640)='./file0\x00', 0x0, 0x0, 0x0, 0xa010, &(0x7f0000002300)=ANY=[]) 05:57:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000006680), 0x0, &(0x7f0000006840)) 05:57:52 executing program 5: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) modify_ldt$read_default(0x2, 0x0, 0x0) 05:57:52 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vcs\x00', 0x0, 0x0) inotify_rm_watch(r0, 0x0) 05:57:52 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000080)='k', 0x1) 05:57:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCGSTAMP(r0, 0x8901, 0x0) 05:57:52 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x40000, 0x0) 05:57:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETX(r0, 0x5432, 0x0) 05:57:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, 0x0) [ 118.430363] FAT-fs (loop0): bogus number of reserved sectors [ 118.463013] FAT-fs (loop0): Can't find a valid FAT filesystem 05:57:52 executing program 5: syz_emit_ethernet(0x1b1, &(0x7f0000000900)=ANY=[@ANYBLOB="aaaaaaaaaabbaaaaaaaaaaaa8100450086dd"], 0x0) 05:57:52 executing program 1: bpf$BPF_PROG_QUERY(0x3, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x2}, 0x64) 05:57:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) accept4$packet(r0, 0x0, &(0x7f0000000140), 0x40800) openat$full(0xffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup(r1) pipe(&(0x7f0000000100)) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0)={0x4, 0x8, 0x0, 0x0, 0x4}, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r2, &(0x7f0000000080)="03042a015c0060001503002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000908d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x8000) 05:57:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x3c}, 0x1, 0x0, 0xf000}, 0x0) [ 118.542463] FAT-fs (loop0): bogus number of reserved sectors [ 118.548305] FAT-fs (loop0): Can't find a valid FAT filesystem 05:57:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000e1f4655fe1f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000001000028020000028400001b8000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333832373135313800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="0000000000000000000000001f4ebd2e6bb144ba8e000d53fbc5896c010000000c00000000000000e0f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003500000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000032000f000300040000000000000000000f002f7c", 0x20, 0x1000}, {0x0}, {&(0x7f0000012500)="ed41000000100000e0f4655fe1f4655fe1f4655f00000000000004000800000000000000050000000600"/64, 0x40, 0x4100}, {0x0}, {0x0, 0x0, 0x100000000}], 0x0, &(0x7f0000013800)) 05:57:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x90e7641f9b752e41, 0x4) 05:57:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0xffffa888, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000440)='./bus\x00', 0x4d00, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000780)=ANY=[], 0x2f) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv_slave_1\x00'}) 05:57:52 executing program 1: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x1, &(0x7f0000000240)=[{&(0x7f00000001c0)="a0", 0x1}], 0x20, &(0x7f0000000300)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 05:57:52 executing program 2: syz_mount_image$udf(0x0, 0x0, 0x0, 0x3, &(0x7f0000002240)=[{&(0x7f0000000080)="cc", 0x1}, {&(0x7f0000000140)="fd", 0x1, 0x681a23a}, {&(0x7f0000001240)="af", 0x1}], 0x0, 0x0) [ 118.660374] EXT4-fs (loop0): couldn't mount RDWR because of unsupported optional features (8000) 05:57:53 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@huge_within_size='huge=within_size'}]}) 05:57:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000680)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@local}, 0xa, @in6=@private2}}, 0xe8) [ 118.738809] EXT4-fs (loop0): couldn't mount RDWR because of unsupported optional features (8000) [ 118.759603] hrtimer: interrupt took 41776 ns 05:57:53 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x100, 0x1}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x20001, 0x0) 05:57:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) accept4$packet(r0, 0x0, &(0x7f0000000140), 0x40800) openat$full(0xffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup(r1) pipe(&(0x7f0000000100)) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0)={0x4, 0x8, 0x0, 0x0, 0x4}, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r2, &(0x7f0000000080)="03042a015c0060001503002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000908d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x8000) 05:57:53 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000006680)=[{&(0x7f00000001c0)='$', 0xffffff1f, 0xfff}], 0x0, 0x0) [ 118.808674] audit: type=1804 audit(1608098273.096:2): pid=9684 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir964444930/syzkaller.ykfXGr/10/bus" dev="sda1" ino=15784 res=1 05:57:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000080)={0x1c}) [ 118.917893] audit: type=1800 audit(1608098273.136:3): pid=9684 uid=0 auid=0 ses=4 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="sda1" ino=15784 res=0 05:57:53 executing program 1: fanotify_mark(0xffffffffffffffff, 0x80, 0x0, 0xffffffffffffff9c, 0x0) 05:57:53 executing program 2: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000011c0)) 05:57:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$read(0x0, 0x0, 0x0) [ 118.987929] audit: type=1804 audit(1608098273.206:4): pid=9706 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir964444930/syzkaller.ykfXGr/10/bus" dev="sda1" ino=15784 res=1 05:57:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 05:57:53 executing program 5: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000300)={[{@utf8='utf8'}, {@nostrict='nostrict'}, {@anchor={'anchor'}}, {@dmode={'dmode'}}], [{@subj_user={'subj_user'}}]}) 05:57:53 executing program 2: syz_emit_ethernet(0x1e, &(0x7f0000000080)={@empty, @local, @void, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "8b05974efc0721db"}}}}, 0x0) 05:57:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB='iocharset=cp737,time_offset=0x0000000000000013,iocharset=utf8,fmask=0', @ANYBLOB="2c666f776e65723d7df62104d17bdbf928e5f8227233e029d826fb4aa1212c"]) 05:57:53 executing program 2: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/53) 05:57:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) accept4$packet(r0, 0x0, &(0x7f0000000140), 0x40800) openat$full(0xffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup(r1) pipe(&(0x7f0000000100)) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0)={0x4, 0x8, 0x0, 0x0, 0x4}, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r2, &(0x7f0000000080)="03042a015c0060001503002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000908d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x8000) [ 119.113352] audit: type=1800 audit(1608098273.206:5): pid=9706 uid=0 auid=0 ses=4 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="sda1" ino=15784 res=0 [ 119.149206] UDF-fs: bad mount option "subj_user=" or missing value [ 119.189957] UDF-fs: bad mount option "subj_user=" or missing value 05:57:53 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2aa400, 0x0) [ 119.312815] FAT-fs (loop1): Unrecognized mount option "fowner=}ö!Ñ{Ûù(åø"r3à)Ø&ûJ¡!" or missing value 05:57:53 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:57:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000180)=0x45, 0x4) 05:57:53 executing program 5: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000300)={[{@utf8='utf8'}, {@nostrict='nostrict'}, {@anchor={'anchor'}}, {@dmode={'dmode'}}], [{@subj_user={'subj_user'}}]}) 05:57:53 executing program 2: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0}, 0x20) 05:57:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) accept4$packet(r0, 0x0, &(0x7f0000000140), 0x40800) openat$full(0xffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup(r1) pipe(&(0x7f0000000100)) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0)={0x4, 0x8, 0x0, 0x0, 0x4}, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r2, &(0x7f0000000080)="03042a015c0060001503002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000908d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x8000) [ 119.363565] FAT-fs (loop1): Unrecognized mount option "fowner=}ö!Ñ{Ûù(åø"r3à)Ø&ûJ¡!" or missing value 05:57:53 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 05:57:53 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 05:57:53 executing program 2: syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000002240)=[{&(0x7f0000000140)="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", 0xec1, 0x681a23a}], 0x0, 0x0) 05:57:53 executing program 1: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000300)={[{@nostrict='nostrict'}, {@anchor={'anchor', 0x3d, 0x6b}}, {@dmode={'dmode'}}, {@session={'session'}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 05:57:53 executing program 4: bpf$BPF_PROG_QUERY(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) [ 119.509201] UDF-fs: bad mount option "subj_user=" or missing value 05:57:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f00000005c0)='`', 0x1) 05:57:53 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4eb9cc0aae3b8b5e) 05:57:53 executing program 5: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000300)={[{@utf8='utf8'}, {@nostrict='nostrict'}, {@anchor={'anchor'}}, {@dmode={'dmode'}}], [{@subj_user={'subj_user'}}]}) [ 119.565235] input: syz0 as /devices/virtual/input/input5 [ 119.589118] input: syz0 as /devices/virtual/input/input6 05:57:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x210) 05:57:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0x4}, 0x40) 05:57:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x6e6bb0}, {{@in6=@loopback, 0x0, 0x33}, 0xa, @in6=@empty, 0x0, 0x1}}, 0xe8) 05:57:54 executing program 3: memfd_create(&(0x7f00000000c0)='system\xdfSo\xb9Y\xa0\xb0:object\a\xb8\x9f\xa1)R90^q\xd6\xfd\xffv\xf4T\xab\xfdN\xe4\x0e\xac\xfc\a\xaf\xd8\xbc\x9a\xc1\x9d\xc8R\xa1,\x16\xec\x15\xdd\x93\xc5\xacE\x95A\xea\amf\xbd:\xbf\xb4\f\xd0\xad\xe5\xe7\x96\x9bM\v0\x80g\v\xdb\xb6\xe4\x9eQ\x0fCR\xa4\vW\x179S)\xe9\xc7Pz.\x8d\xdco\x88l\xc4\xebrG\xcb<\xb1\xc5\xcc\x1d\xce\xbf\xb9\x16Qn\x1d\x95\x9e\x8d\x89\xaa\xd4\xd1\xee\xb4\x1aY\xc6\xb1\xc8\r\f\xe0\x83G\x14\xefw\x9cv\x1c\x1eN\xf1T\xf1y\xe3\xa8\x98\x11\xcd\x0f\x91\xe3\xf7-\x03iK\xb8c\xe6\xe3\xf7\x13}Vb\xc7&\xc4\x92\xd1a\x96\x1f\xba\x93\xa3\xd4\xc3\xf9\xaf\xd5\x94\x1fhm\xa2\xf4\x16\x9aM\xb9\x98\xba\xa5\x82\x9f].\xc0\xc3\x13\xc7fL\xf9\f\x1e\xb5A\xbb\x9b\xc1]\xd3\x15Hw6)\x90l\xa1\xcf\xba\x9b\xba\a\xe8\x87\xc5\xf3<_$O\x83\xc1\xf0W\x0f\xb9\xffGR{M\xd7Y@\x97\x8c', 0x0) 05:57:54 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) dup2(r0, r1) 05:57:54 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/thread-self\x00', 0x100000, 0x0) 05:57:54 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 119.725425] UDF-fs: bad mount option "subj_user=" or missing value 05:57:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000740)) 05:57:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000000)="b6370b84", 0x4) 05:57:54 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@remote, @multicast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @empty}, {0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}, 0x0) 05:57:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x0, "3367eb750e3eb5175f43ca800a8e40adfd1d2e"}) 05:57:54 executing program 5: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000300)={[{@utf8='utf8'}, {@nostrict='nostrict'}, {@anchor={'anchor'}}, {@dmode={'dmode'}}], [{@subj_user={'subj_user'}}]}) 05:57:54 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x11, 0x0, 0x0, 0x0}, 0x20) 05:57:54 executing program 3: semget(0x1, 0x0, 0x6c9) 05:57:54 executing program 2: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000300)={[], [{@subj_user={'subj_user'}}]}) 05:57:54 executing program 4: semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x20}], 0x1, &(0x7f00000000c0)={0x0, 0x989680}) 05:57:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000008c0)=ANY=[@ANYBLOB="090000000000000002004e230a0101000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000003"], 0x210) 05:57:54 executing program 0: shmget(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) [ 119.900200] UDF-fs: bad mount option "subj_user=" or missing value 05:57:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 05:57:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x8008, &(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10) 05:57:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000080), 0x4, 0x0, 0x0, &(0x7f0000000140), 0x0) [ 119.955430] UDF-fs: bad mount option "subj_user=" or missing value 05:57:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x8, 0x5, 0x4d0, 0x1e0, 0x2b0, 0xffffffff, 0xf0, 0xf0, 0x400, 0x400, 0xffffffff, 0x400, 0x400, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@private1, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @port, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv6=@loopback, @port, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x108, 0x150, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@frag={{0x30, 'frag\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x530) 05:57:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 120.048663] UDF-fs: bad mount option "subj_user=" or missing value 05:57:54 executing program 1: bpf$BPF_PROG_QUERY(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x2}, 0x64) 05:57:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@loopback}, 0x0, @in=@private}}, 0xe8) 05:57:54 executing program 2: bpf$BPF_PROG_QUERY(0x15, 0x0, 0x0) 05:57:54 executing program 5: pkey_mprotect(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0xffffffffffffffff) 05:57:54 executing program 0: clock_getres(0x9caad035b7796f93, 0x0) 05:57:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x8, 0x5, 0x4d0, 0x1e0, 0x2b0, 0xffffffff, 0xf0, 0xf0, 0x400, 0x400, 0xffffffff, 0x400, 0x400, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@private1, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @port, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv6=@loopback, @port, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x108, 0x150, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@frag={{0x30, 'frag\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x530) 05:57:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x4, 0x0, 0x0) 05:57:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xfffffffffffffffb}], 0x0, &(0x7f0000000200)) 05:57:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x17, &(0x7f0000000100)={0x8, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x0, @remote}}}, 0x108) 05:57:54 executing program 5: bpf$BPF_PROG_QUERY(0x4, 0x0, 0x10) 05:57:54 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000440)) 05:57:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x8, 0x5, 0x4d0, 0x1e0, 0x2b0, 0xffffffff, 0xf0, 0xf0, 0x400, 0x400, 0xffffffff, 0x400, 0x400, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@private1, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @port, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv6=@loopback, @port, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x108, 0x150, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@frag={{0x30, 'frag\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x530) 05:57:54 executing program 2: syz_mount_image$squashfs(&(0x7f00000000c0)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}]}) 05:57:54 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x20001, 0x0) 05:57:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) [ 120.259871] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 05:57:54 executing program 0: fanotify_mark(0xffffffffffffffff, 0x158, 0x0, 0xffffffffffffffff, 0x0) 05:57:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x8, 0x5, 0x4d0, 0x1e0, 0x2b0, 0xffffffff, 0xf0, 0xf0, 0x400, 0x400, 0xffffffff, 0x400, 0x400, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@private1, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @port, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv6=@loopback, @port, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x108, 0x150, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@frag={{0x30, 'frag\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x530) 05:57:54 executing program 2: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x2}, 0x64) [ 120.334491] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 05:57:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x12, &(0x7f0000000500)="2d219cfc", 0x4) 05:57:54 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x751401, 0x0) 05:57:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000680)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@local}, 0x0, @in6=@private2}}, 0xe8) 05:57:54 executing program 0: ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 05:57:54 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@loopback, 0x4e21, 0x400, 0x4e21, 0x1, 0xa, 0x0, 0x20, 0x8, 0x0, 0xee01}, {0x80, 0x7, 0x2, 0xfffffffffffffff8, 0x9, 0x401, 0x101, 0x400000}, {0x1, 0x4, 0x5, 0xffffffff}, 0x1ff, 0x6e6bb7, 0x1, 0x1, 0x0, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x11}, 0x4d2, 0x32}, 0x2, @in6=@local, 0x0, 0x2, 0x2, 0x7, 0x5, 0x6, 0xff}}, 0xe8) r0 = semget(0x2, 0x0, 0x80) semctl$SEM_INFO(r0, 0x3, 0x13, &(0x7f0000000400)=""/106) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x5452, 0x748000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="000000000018220000000000", @ANYBLOB="a7e26b179e8c3a26133fc2d3e533489408975a553386ae4720f3a88feee8d98aaf6b0935c2d13c766481c006fe08adee37bc2f759957862363b14e31344af25c8720f63e731995be51a17eef8dcbe7f6441d48350af2d003c6565deca87b5c", @ANYBLOB="0000000005000010f8e63a15244147d3a735930b4701aadd4e567c32a98359f37591255e87ff97a11a64241f745845071546064d658738e86769f3d1938e517400c02ac955eb16522ee1de825174a349d282ecb23c62ba4c7d95c604d92a746628ebf79b75e104c67acfb194ecdbcf98f1c827a08c43d515931a047155c668b8acc51a788550bf0bce450fd9649c19794e36d93c15a5460d9a"], &(0x7f0000000280)='GPL\x00', 0xff, 0x9, &(0x7f00000002c0)=""/9, 0x41000, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x0, 0x0, 0x20}, 0x10, 0x2ecc8}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0xa, 0x1, 0x200, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) 05:57:54 executing program 1: syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000001c0)="a0", 0x1, 0x401}], 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) 05:57:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) 05:57:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000080)='[', 0x1) 05:57:54 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 05:57:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x20, 0x0, 0x0) 05:57:54 executing program 3: bpf$BPF_PROG_QUERY(0x17, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x2}, 0x64) 05:57:54 executing program 2: io_setup(0x3ff, &(0x7f0000000040)) 05:57:54 executing program 4: syz_mount_image$fuse(&(0x7f0000000480)='fuse\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 05:57:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) 05:57:54 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, 0x0) 05:57:54 executing program 3: shmget(0x2, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) 05:57:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7f) 05:57:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448dd, &(0x7f0000000000)="12") 05:57:55 executing program 0: semctl$GETPID(0x0, 0x2, 0xb, 0x0) 05:57:55 executing program 2: semtimedop(0x0, &(0x7f0000000080)=[{0x1, 0x20}, {0x0, 0x9, 0x1c00}], 0x2, &(0x7f00000000c0)={0x0, 0x989680}) 05:57:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000140)) 05:57:55 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x81, 0x0) 05:57:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x4e24, @broadcast}, 0x10) 05:57:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0x0) 05:57:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448dd, &(0x7f0000000000)="12") 05:57:55 executing program 4: shmget(0x3, 0x3000, 0x4da13f50a0c43bd0, &(0x7f0000ffc000/0x3000)=nil) 05:57:55 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000000480)={@link_local, @remote, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "981449835ef292ce"}}}}, 0x0) 05:57:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000080)='k', 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) 05:57:55 executing program 5: semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x20}], 0x1, 0x0) 05:57:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000000)="b6370b84e94ef52a", 0x8) 05:57:55 executing program 3: bpf$BPF_PROG_QUERY(0x13, 0x0, 0x0) 05:57:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x4, &(0x7f0000000100)="09f1", 0x2) 05:57:55 executing program 0: bpf$BPF_PROG_QUERY(0x4, 0x0, 0x0) 05:57:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:57:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000100)=0x54) 05:57:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448dd, &(0x7f0000000000)="12") 05:57:55 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000100)={0x0, 0x0, "3901cc"}) 05:57:55 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vcs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, 0x0) 05:57:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448dd, &(0x7f0000000000)="12") 05:57:55 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x4, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}) 05:57:55 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b03"], 0x191) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+'}, 0x16, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{}, {0xfffffffc}]}, 0x14, 0x0) 05:57:55 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vcs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5451, 0x0) 05:57:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000440), 0x4) 05:57:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0xfffffffffffffffb}], 0x0, &(0x7f0000000200)={[{@inode_readahead_blks={'inode_readahead_blks'}}]}) 05:57:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0xa, 0x0, 0x0, 0x0, 0x3d58155dc3d2b5c0}, 0x40) 05:57:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000440)={@dev, @dev}, 0x8) 05:57:55 executing program 2: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000040)=""/90) 05:57:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x5806, &(0x7f00000003c0)) 05:57:55 executing program 5: shmget$private(0x0, 0xc000, 0x0, &(0x7f0000ff1000/0xc000)=nil) 05:57:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}, {}, 0x206}) 05:57:55 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x204400, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 05:57:55 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vcs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5460, 0x0) [ 121.157901] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:57:55 executing program 5: bpf$BPF_PROG_QUERY(0x16, 0x0, 0x0) 05:57:55 executing program 4: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000300)) 05:57:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000880)=ANY=[]) [ 121.248465] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:57:55 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, 0x0) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000100)={0x0, 0x0, "3901cc", 0x22}) 05:57:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r0, &(0x7f0000000040), 0x0}, 0x20) 05:57:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000240)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x1a\x00@\x00\x00\x00\x00\x00\t\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\b\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\xb5\x00\xa3\r\xd2\x149\xdbU\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x12\xffa\xad\xee,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\xea\xba/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb7\"\xa9\xef\xa2\xd8\x03_\xee=[\x1a\x8e\xe3\x1cl\x145\xddC\x15(\xaf\'\fo\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5R\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xf0\x9f\x82\x9d\xae\x9cyg-\x972W\x00\x00Q\xe0\xab\xc1w\x03;-^(\x02\xe0\xd8\b#\x9a\xcd\xea\xe6\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99\xeau\x7f\x81@\b\xe1,\xc0Q\xf3\x16\x82\xb5[\x91Y\xb1\x1c$\xdf\x18\xf1\x96D\x16\xfa#\x03`\x91j\x14\xf2\xfb\x02X\x1eZ\xfb\x00m\xf0U\x7fl\x8bo\xf4\xf9p\x13\r\xc9\xac\xfda\x06\x00c\xaf\xfc\xf1{@\xf8\xc4\x93\x1f\x00\x00\x00\x00\x00\x00\x00\xa3\x02\x00') 05:57:55 executing program 5: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x80000) [ 121.320322] FAT-fs (loop0): bogus number of reserved sectors [ 121.324737] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 121.344926] FAT-fs (loop0): Can't find a valid FAT filesystem [ 121.357260] UDF-fs: Scanning with blocksize 512 failed 05:57:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) [ 121.383652] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 05:57:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f0000000080)=0x0) io_submit(r0, 0x0, 0x0) 05:57:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x8010, &(0x7f0000000680)) 05:57:55 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f00000049c0)={&(0x7f0000004980)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f000000aec0)={&(0x7f000000ae80)='./file0\x00', 0x0, 0x8}, 0x10) 05:57:55 executing program 2: r0 = shmget$private(0x0, 0xc000, 0x0, &(0x7f0000ff1000/0xc000)=nil) shmctl$SHM_LOCK(r0, 0xb) [ 121.481280] FAT-fs (loop0): bogus number of reserved sectors [ 121.487284] FAT-fs (loop0): Can't find a valid FAT filesystem [ 121.507646] UDF-fs: Scanning with blocksize 1024 failed 05:57:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000003c0)) [ 121.529584] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 121.579460] UDF-fs: Scanning with blocksize 2048 failed [ 121.593356] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 121.633207] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 121.647824] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 121.648184] UDF-fs: Scanning with blocksize 4096 failed [ 121.712878] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 121.719586] UDF-fs: Scanning with blocksize 512 failed [ 121.741552] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 121.748233] UDF-fs: Scanning with blocksize 1024 failed [ 121.754844] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 05:57:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="02"]}) 05:57:56 executing program 0: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 121.762081] UDF-fs: Scanning with blocksize 2048 failed [ 121.768149] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 121.780505] UDF-fs: Scanning with blocksize 4096 failed 05:57:56 executing program 3: perf_event_open(&(0x7f0000000280)={0x0, 0x200002f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:57:56 executing program 2: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) 05:57:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "0bbfaf21dee1c9534406ee370b0ac4780a1299"}) 05:57:56 executing program 1: semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x20}, {0x0, 0x9, 0x1c00}], 0x2, 0x0) 05:57:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1b}, 0x40) 05:57:56 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000006680)=[{&(0x7f00000001c0)='$', 0xfdef, 0xfff}], 0x0, 0x0) 05:57:56 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000002640)='./file0\x00', 0x0, 0x3, &(0x7f0000002240)=[{&(0x7f0000000080)="cc", 0x1}, {&(0x7f0000000140)="fd", 0x1, 0x681a23a}, {&(0x7f0000001240)="af", 0x1, 0xfffffffffffff5b3}], 0xa010, &(0x7f0000002300)=ANY=[]) 05:57:56 executing program 1: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8940, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x1, &(0x7f0000000240)=[{&(0x7f00000001c0)="a0189d870cc73a134c208188a5172891dc16eb4363017b81889ca43f3bb247bc7e91997e53cd6f800495cbc1f164c70601f3c9254a463a74087dab824b2fa2d2793d6a156b9fcd6e713509c88e2e4536ee48e64ec7b41b6b1591b0f124ad7b1c1813470b192d4959f6e0", 0x6a}], 0x20, &(0x7f0000000300)={[{@anchor={'anchor'}}, {@bs={'bs'}}]}) 05:57:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}}) 05:57:56 executing program 2: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x464, 0x100, 0x70bd2a, 0x25dfdbff, "c1377c5037d7a27053ebd310ce0c539e61ebe74dcf942d60c40222deac", ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8014}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000240)=@ipx, &(0x7f00000002c0)=0x80, 0x80000) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB="0801ca0859b0100029bd7000fcdbdf259a950311f86a72acd4a1a548845730c9f600c16164dbcdca32a7e8bc9b2378632b5b9f094e0a832ceefef61cc27a6194a66b87f3d68d613c2f54699d41874193faf264849e49425bbbc6db02258073495ecb1b9cd3074b760ad42066500d4022f432f6163b9a46633430c85a7fb1910b482ad1ea469bdce757548cfc62382eb5a692ff94a9cc6831b68cab7e61f1e03aaf27420fbda951aeca18f879360b28e2b331892ea516e0dc2d317008af8304e2190d39c0b20205ba466b8c463cc6d7ce259658f9c619ffcdaf349ce90ac3cb582f503cb69d10e804c76284be8617dbd57c2d9f649336cd3448b6b5476b54f20b00b43ee81fe4b1c584f87cefd4755886f0fb22da0bd5526bd9f8a500000047cc4a"], 0x108}, 0x1, 0x0, 0x0, 0x84}, 0x81) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400, 0xbedf) 05:57:56 executing program 5: pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x2, 0x1b, r0, 0x0) 05:57:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x7, &(0x7f0000000080)=@framed={{}, [@btf_id, @map_val]}, &(0x7f0000000100)='syzkaller\x00', 0x3, 0xed, &(0x7f0000000140)=""/237, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:57:56 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/thread-self\x00', 0x0, 0x0) 05:57:56 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x8b, 0x1, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x8c, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) tkill(r0, 0x1000000000015) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x2f) 05:57:56 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000006700)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 05:57:56 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 05:57:56 executing program 5: pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x2, 0x1b, r0, 0x0) 05:57:56 executing program 0: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000002640)='./file0\x00', 0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f0000002300)=ANY=[@ANYBLOB='nostrict,undelete,gid=forget']) 05:57:56 executing program 4: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)) 05:57:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @dev}, {0x306, @random="fc014f3e8d33"}, 0x0, {0x2, 0x0, @multicast1}, 'veth0_to_batadv\x00'}) 05:57:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x7, 0x0, 0x0) 05:57:56 executing program 5: pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x2, 0x1b, r0, 0x0) 05:57:56 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 122.407985] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 122.429773] UDF-fs: Scanning with blocksize 512 failed 05:57:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) 05:57:56 executing program 4: socket$inet(0x2, 0x5f00e9b650be1775, 0x0) 05:57:56 executing program 5: pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x2, 0x1b, r0, 0x0) [ 122.460640] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found 05:57:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 05:57:56 executing program 3: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000300)={[{@session={'session'}}]}) 05:57:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000000)="b6370b84e94ef52a112fe172", 0xc) [ 122.529432] UDF-fs: Scanning with blocksize 1024 failed [ 122.537343] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 122.570091] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 122.577880] UDF-fs: Scanning with blocksize 2048 failed [ 122.584751] UDF-fs: Scanning with blocksize 512 failed [ 122.598816] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 122.609918] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 122.616996] UDF-fs: Scanning with blocksize 1024 failed [ 122.617986] UDF-fs: Scanning with blocksize 4096 failed [ 122.631511] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 122.646523] UDF-fs: Scanning with blocksize 2048 failed [ 122.654935] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 122.662073] UDF-fs: Scanning with blocksize 4096 failed [ 122.684332] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 122.691311] UDF-fs: Scanning with blocksize 512 failed [ 122.696916] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 122.704693] UDF-fs: Scanning with blocksize 1024 failed [ 122.711302] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 122.718174] UDF-fs: Scanning with blocksize 2048 failed [ 122.726122] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 122.733688] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 122.740359] UDF-fs: Scanning with blocksize 4096 failed [ 122.746015] UDF-fs: Scanning with blocksize 512 failed [ 122.766374] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 122.773462] UDF-fs: Scanning with blocksize 1024 failed 05:57:57 executing program 0: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000002640)='./file0\x00', 0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f0000002300)=ANY=[@ANYBLOB='nostrict,undelete,gid=forget']) 05:57:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000680)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80}}, {{@in=@local}, 0x0, @in6=@private2}}, 0xe8) 05:57:57 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000300)='tmpfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)={[{@nr_inodes={'nr_inodes', 0x3d, [0x39, 0x0]}}]}) 05:57:57 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000080)='fscrypt-provisioning\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x0, 0x0, @b='aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa11111111111111111111111111111111'}, 0x48, 0x0) 05:57:57 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0xbedf) [ 122.779382] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 122.786793] UDF-fs: Scanning with blocksize 2048 failed [ 122.793054] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 122.799719] UDF-fs: Scanning with blocksize 4096 failed 05:57:57 executing program 4: syz_mount_image$udf(0x0, 0x0, 0x0, 0x2, &(0x7f0000002240)=[{&(0x7f0000000140)="fd", 0x1, 0x681a23a}, {&(0x7f0000001240)="af", 0x1, 0xfffffffffffff5b3}], 0x0, 0x0) 05:57:57 executing program 2: pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fanotify_mark(r0, 0x80, 0x0, 0xffffffffffffffff, 0x0) 05:57:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@multicast1, 0x0, 0x4}}, 0xe8) 05:57:57 executing program 1: bpf$BPF_PROG_QUERY(0x12, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x2}, 0x64) 05:57:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x6a2}], 0x0, &(0x7f0000000540)) 05:57:57 executing program 1: syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000300)={[{@utf8='utf8'}, {@nostrict='nostrict'}, {@anchor={'anchor', 0x3d, 0x6b}}, {@dmode={'dmode'}}, {@session={'session', 0x3d, 0x8}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 05:57:57 executing program 2: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 122.952904] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 122.968459] UDF-fs: Scanning with blocksize 512 failed [ 122.975049] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 122.981894] UDF-fs: Scanning with blocksize 1024 failed [ 122.987532] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 122.994692] UDF-fs: Scanning with blocksize 2048 failed [ 122.998092] UDF-fs: bad mount option "session=00000000000000000008" or missing value [ 123.014464] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 123.023027] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 123.053452] UDF-fs: Scanning with blocksize 4096 failed [ 123.071014] Bluetooth: hci0 command 0x0401 tx timeout [ 123.111852] UDF-fs: bad mount option "session=00000000000000000008" or missing value 05:57:57 executing program 0: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000002640)='./file0\x00', 0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f0000002300)=ANY=[@ANYBLOB='nostrict,undelete,gid=forget']) 05:57:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x3c}, 0x1, 0x0, 0x3c4f}, 0x0) 05:57:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x3, 0xed, &(0x7f0000000140)=""/237, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) 05:57:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 05:57:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x8c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x3c}}, 0x0) 05:57:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x18}, 0x40) 05:57:57 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 05:57:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, 0xe8) 05:57:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x29, &(0x7f0000000080)={0x0, {{0x2, 0x0, @dev}}, {{0x2, 0x0, @multicast2}}}, 0x108) [ 123.280053] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 123.307729] UDF-fs: Scanning with blocksize 512 failed 05:57:57 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xfffffffffffffffc, 0x80000) 05:57:57 executing program 5: bpf$BPF_PROG_QUERY(0x6, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x2}, 0x64) [ 123.363884] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 123.413972] UDF-fs: Scanning with blocksize 1024 failed [ 123.438276] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 123.458151] UDF-fs: Scanning with blocksize 2048 failed [ 123.466784] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 123.475164] UDF-fs: Scanning with blocksize 4096 failed 05:57:57 executing program 0: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000002640)='./file0\x00', 0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f0000002300)=ANY=[@ANYBLOB='nostrict,undelete,gid=forget']) 05:57:57 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:57:57 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000005c0)=""/4096) 05:57:57 executing program 3: bpf$BPF_PROG_QUERY(0xd, 0x0, 0x0) 05:57:57 executing program 1: bpf$BPF_PROG_QUERY(0x15, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x2}, 0x64) 05:57:57 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x81) 05:57:57 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f000000b480)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000004440)=[@rights={{0xfffffffffffffe9d, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}], 0x1, 0x0) 05:57:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000280)=0x80) read$alg(r1, 0x0, 0x0) 05:57:57 executing program 2: r0 = shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x6000) r1 = shmat(0x0, &(0x7f0000cee000/0x4000)=nil, 0x6000) shmdt(r1) shmdt(r0) 05:57:57 executing program 1: r0 = shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x6000) shmat(0x0, &(0x7f0000cee000/0x4000)=nil, 0x6000) shmdt(r0) 05:57:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_OPEN(r0, 0x0, 0x0) 05:57:57 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) [ 123.598535] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 123.635641] UDF-fs: Scanning with blocksize 512 failed [ 123.662425] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 123.688161] UDF-fs: Scanning with blocksize 1024 failed [ 123.705703] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 123.718674] UDF-fs: Scanning with blocksize 2048 failed [ 123.730415] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 123.737951] UDF-fs: Scanning with blocksize 4096 failed 05:57:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/79, 0x4f) 05:57:58 executing program 2: r0 = shmat(0x0, &(0x7f0000f45000/0x2000)=nil, 0x7000) shmdt(r0) shmat(0x0, &(0x7f0000f46000/0x3000)=nil, 0x0) 05:57:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000200)=@ipv6_getaddr={0x40, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @mcast2}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 05:57:58 executing program 1: r0 = socket(0x10, 0x3, 0x4) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 05:57:58 executing program 5: r0 = socket(0x2, 0x3, 0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000880)) 05:57:58 executing program 0: clock_getres(0x33256bfaebc9e2a7, 0x0) 05:57:58 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 05:57:58 executing program 1: select(0x40, &(0x7f0000000f80), &(0x7f0000000fc0)={0x1}, 0x0, &(0x7f0000001040)={0x77359400}) 05:57:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000004940)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)}], 0x2, 0x0) 05:57:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001840)=[{0x0}, {0x0}, {&(0x7f0000000400)='u', 0x1}], 0x3}, 0x0) 05:57:58 executing program 2: r0 = shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x6000) shmdt(r0) clock_gettime(0x0, &(0x7f0000001440)) 05:57:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000), 0x26) 05:57:58 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000f45000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x6000) 05:57:58 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 05:57:58 executing program 4: ioprio_set$uid(0x0, 0x0, 0x2000) 05:57:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:57:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000000c0)='syz1\x00') 05:57:58 executing program 2: sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000380)) 05:57:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x4, 0x0, 0x0, 0x800}, {}, {0x6}]}) 05:57:58 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 05:57:58 executing program 0: waitid(0x1, 0x0, 0x0, 0x40000005, 0x0) 05:57:58 executing program 1: socket(0x2, 0xa, 0x3f) 05:57:58 executing program 3: request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='batadv_slave_0\x00', 0x0) 05:57:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 05:57:58 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 05:57:58 executing program 0: perf_event_open(&(0x7f0000007540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x48400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:57:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x2c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@FRA_SRC={0x8}, @FRA_FLOW={0x8, 0xb, 0x8}]}, 0x2c}}, 0x0) [ 124.116292] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) 05:57:58 executing program 1: r0 = socket(0x2, 0x3, 0x4) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast2}}}], 0x20}, 0x0) 05:57:58 executing program 5: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 05:57:58 executing program 3: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000050c0)) [ 124.191635] audit: type=1326 audit(1608098278.487:6): auid=0 uid=0 gid=0 ses=4 pid=10456 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 05:57:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x4}, {0x6}]}) 05:57:59 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020a008007000000000000000000000005001800ffffffff"], 0x38}}, 0x0) 05:57:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 05:57:59 executing program 1: shmat(0x0, &(0x7f0000f45000/0x2000)=nil, 0x7000) pkey_mprotect(&(0x7f0000f44000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 05:57:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000640)={0x0, 0x0}) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 05:57:59 executing program 5: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) [ 124.871314] audit: type=1326 audit(1608098279.167:7): auid=0 uid=0 gid=0 ses=4 pid=10456 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 05:57:59 executing program 5: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 05:57:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000580)={0x11, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) 05:57:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000001b40)=""/102400, &(0x7f0000000040)=0x19000) 05:57:59 executing program 5: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) [ 124.963666] audit: type=1326 audit(1608098279.257:8): auid=0 uid=0 gid=0 ses=4 pid=10499 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 05:57:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip6_flowlabel\x00') read$char_usb(r0, &(0x7f0000000180)=""/233, 0xe9) 05:57:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x80800) syz_genetlink_get_family_id$gtp(0x0) [ 125.160792] Bluetooth: hci0 command 0x0401 tx timeout 05:58:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0xffffffffffffffd3) 05:58:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x105000, 0x0) 05:58:00 executing program 5: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 05:58:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$input_event(r0, 0x0, 0x0) 05:58:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x0) [ 125.745319] audit: type=1326 audit(1608098280.037:9): auid=0 uid=0 gid=0 ses=4 pid=10499 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 05:58:00 executing program 5: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 05:58:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@mpls_newroute={0x1c, 0x18, 0x1}, 0x1c}}, 0x0) 05:58:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') read$char_usb(r0, &(0x7f0000000140)=""/191, 0xbf) 05:58:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:58:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) 05:58:00 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/uts\x00') ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 05:58:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 05:58:00 executing program 2: syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000001c40)) 05:58:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$alg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001900)="153751be2dbc28163c26e4a287e1cf875ab393a6137210a0db5acdb113a6f8e89e1ac3f423a5a6f1a44ba99c796906fae4cb0ea548e91451127b1c642f6bfc58a5cab2247b4263b4836e7d6b2335fe7c6075f3399adce1fe66828783b2edc72e818a6698644bc80f8fab570310e9f46b3130a5088fd39dfa83550cb4ca5794ab", 0x80}], 0x1, &(0x7f0000000440)=[@op={0x18}, @op={0x18}], 0x30}, 0x0) 05:58:00 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/uts\x00') ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 05:58:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) 05:58:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:00 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f0000000200), 0x0, &(0x7f0000000280)={0x9}, 0x0, 0x0) 05:58:00 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/uts\x00') ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 05:58:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000002c0)={'syz1\x00'}, 0x45c) 05:58:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 05:58:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000004f80)=[{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000000)="9a", 0x1}, {0x0}, {&(0x7f0000000280)='z', 0x1}], 0x3, &(0x7f00000015c0)=[@op={0x18}, @op={0x18}], 0x30}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}], 0x2, 0x0) 05:58:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 05:58:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f00000001c0)={{0x0, 0xea60}}) 05:58:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') read$char_usb(r0, &(0x7f0000000140)=""/191, 0xbf) 05:58:00 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0xba01d0ea8841a984, 0x0) 05:58:00 executing program 2: sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) pipe2$9p(&(0x7f0000000640), 0x0) 05:58:01 executing program 1: mount$fuse(0x0, 0x0, &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) 05:58:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 05:58:01 executing program 3: perf_event_open(&(0x7f000000be80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x280a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:58:01 executing program 5: r0 = socket(0x2, 0x3, 0x4) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast2}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x40010060) 05:58:01 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000200)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) 05:58:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x46, &(0x7f0000000000)={&(0x7f0000000300)=@bridge_delneigh={0x34, 0x1d, 0x1, 0x0, 0x0, {}, [@NDA_SRC_VNI, @NDA_DST_MAC={0x8, 0x1, @dev}]}, 0xfcc1}}, 0x0) 05:58:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000005e80)=@ipv4_delrule={0x1c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 05:58:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000000)=@ipv4_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x2}]}, 0x1c}}, 0x0) 05:58:01 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:01 executing program 2: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x672a82, 0x0) 05:58:01 executing program 1: getrusage(0x1, &(0x7f0000000140)) 05:58:01 executing program 0: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0) 05:58:01 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/nvram\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000001b00)='\x00', 0x0, 0xee01, 0x1000) 05:58:01 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) [ 126.956548] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 05:58:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 05:58:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 05:58:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 05:58:01 executing program 3: r0 = getpgid(0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x9, 0x4, @tid=r0}, &(0x7f00000001c0)) 05:58:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000003c00)={&(0x7f0000003a80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000003bc0)={&(0x7f0000003b40)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 05:58:01 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{0x800}]}) 05:58:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:58:01 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 05:58:01 executing program 2: pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 05:58:01 executing program 3: socket(0x2, 0x0, 0xf42) 05:58:01 executing program 1: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 05:58:01 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:01 executing program 5: r0 = getpgid(0x0) tkill(r0, 0x20) 05:58:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) 05:58:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x208201, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 05:58:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 127.230642] Bluetooth: hci0 command 0x0401 tx timeout 05:58:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 05:58:01 executing program 1: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80), 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @multicast1}}}], 0x20}, 0x0) 05:58:01 executing program 2: pselect6(0x40, &(0x7f0000000080)={0x1}, &(0x7f00000000c0)={0x5}, 0x0, 0x0, 0x0) 05:58:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='gid_map\x00') read$char_usb(r0, &(0x7f0000000100)=""/187, 0xbb) write$P9_RWSTAT(r0, 0x0, 0x0) 05:58:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 05:58:01 executing program 3: perf_event_open(&(0x7f000000be80)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:58:01 executing program 1: r0 = gettid() rt_sigqueueinfo(r0, 0x12, &(0x7f0000000700)={0x0, 0x0, 0xffff}) 05:58:01 executing program 5: clock_gettime(0x3, &(0x7f0000000400)) 05:58:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') read$char_usb(r0, &(0x7f0000000180)=""/224, 0xe0) 05:58:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 05:58:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000580)={0x38, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x38}}, 0x0) 05:58:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x0) 05:58:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f0000000040)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x30}, [@FRA_SRC={0x8, 0x2, @dev}]}, 0x24}}, 0x0) 05:58:01 executing program 5: socketpair(0x2, 0x3, 0x6, 0x0) 05:58:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, 0x0}, 0x0) 05:58:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x2, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2}]}, 0x20}}, 0x0) 05:58:01 executing program 3: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x4}, &(0x7f0000000140)={0x0, 0x3938700}, 0x0) 05:58:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x14, 0x1, 0x3, 0x101}, 0x14}}, 0x0) 05:58:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, 0x0}, 0x0) 05:58:01 executing program 1: pkey_mprotect(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0xffffffffffffffff) 05:58:01 executing program 5: shmat(0x0, &(0x7f0000f45000/0x2000)=nil, 0x7000) pkey_mprotect(&(0x7f0000f44000/0x3000)=nil, 0x3000, 0x6, 0xffffffffffffffff) 05:58:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000580)={0x38, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x41, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) 05:58:01 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001c80)) 05:58:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000005e80)=@ipv4_delrule={0x28, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_TUN_ID={0xc, 0xc, 0x1, 0x0, 0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40841}, 0x20040010) 05:58:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, 0x0}, 0x0) 05:58:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x8, 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x16}, @sadb_spirange, @sadb_key={0x20, 0x0, 0x788, 0x0, "c98e3280168e7be8c956762f540494a764d969e0c5ff485a11232517e16e6d54232bdd0f49b48a41d4ea6570d83f758b8fb8ec12a22c91e766f573186a18e9545b9a9dde3b95ce6b3b784cc195886060613d440e0c6249c69e73d4361711d519d6f56cfd8061f5af1f22cf9613c74935f0e1c354ceb0d48a1cd4b0b10e011fdf90a2025f2dd9d954ab1018085f47d0fcccbaa3a61363d2dd1fb48c300b88ed5b2698f533a20d525c347f1986a10e14ca82501cf06e903ed4d5e5eedef018c59a0d5e02f51901e051dc8674cc4e87295785d1c62fd40e4255379efeeaa32fd20016b7e1cbda6ea08b624efcb4857fadfbc0"}, @sadb_x_nat_t_port={0x1}, @sadb_sa={0x2}, @sadb_x_filter={0x5, 0x1a, @in, @in=@broadcast}, @sadb_x_sa2={0x2}]}, 0x1a8}}, 0x0) [ 127.526121] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:58:01 executing program 3: perf_event_open(&(0x7f000000be80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:58:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={0x0}}, 0x0) 05:58:01 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_vs\x00') read$char_usb(r0, &(0x7f0000000180)=""/224, 0xe0) 05:58:01 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) 05:58:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2004910, 0x0) 05:58:01 executing program 5: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80), 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x20}, 0x0) 05:58:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={0x0}}, 0x0) 05:58:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000240), 0x4) 05:58:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/../file0\x00', 0x0) 05:58:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={0x0}}, 0x0) 05:58:02 executing program 2: open$dir(&(0x7f00000001c0)='./file1\x00', 0x40, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file1\x00'}, 0x6e) 05:58:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x8}, 0x14}}, 0x0) 05:58:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 05:58:02 executing program 3: pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0xffffffffffffffff) 05:58:02 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00'}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) getpgid(0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000001680)='SMC_PNETID\x00') 05:58:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000004f80)=[{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000000)="9a", 0x1}, {&(0x7f00000000c0)="f8", 0x1}, {&(0x7f0000000280)='z', 0x1}], 0x3, &(0x7f00000015c0)=[@op={0x18}, @op={0x18}], 0x30}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}], 0x2, 0x0) 05:58:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x20000003}) 05:58:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x0, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:02 executing program 1: shmat(0x0, &(0x7f0000f45000/0x2000)=nil, 0x7000) r0 = shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x6000) shmdt(r0) 05:58:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) 05:58:02 executing program 0: execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 05:58:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@can_newroute={0x14, 0x18, 0x1}, 0x14}}, 0x0) 05:58:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x0, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:58:02 executing program 0: r0 = shmat(0x0, &(0x7f0000f45000/0x2000)=nil, 0x7000) shmdt(r0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x7000) 05:58:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x0, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:02 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x3938700}, {0x0, r0+60000000}}, &(0x7f00000001c0)) 05:58:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x0, 0x0}) 05:58:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:02 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/mnt\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 05:58:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') read$char_usb(r0, &(0x7f0000000140)=""/191, 0xbf) read$char_usb(r0, 0x0, 0x0) 05:58:02 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x103002, 0x0) 05:58:02 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x11) 05:58:02 executing program 0: pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x14, 0xffffffffffffffff) 05:58:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x2082, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}}) 05:58:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x40025, 0x0) 05:58:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000040)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x10}, [@FRA_SRC={0x8, 0x2, @dev}]}, 0x24}}, 0x0) 05:58:02 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendto$unix(r0, &(0x7f0000000140)="d29a752b89fc431fb2e80ba54a2ab5243688dc0d40cb11fcd55cd25bb6f93a19edcad199afe4160d3defe7403d464ff05ceafeba9bb047b595de14842449795623f72d1f059b3605f0f50c1ff478f9fa9083cb99a367054752784fdcc9593fa971d67bb9749869e4e41bc8cccd8cbae72c1b8d7c27a8b9a1600696e7379305f42ff0eee30d044389fe4658c97bdf9d677649c1ac3b629c273276a2de2e0bc325", 0xa0, 0x1, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xff65) 05:58:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:02 executing program 2: getresuid(&(0x7f0000000240), &(0x7f0000000000), &(0x7f0000003840)) 05:58:02 executing program 3: fanotify_mark(0xffffffffffffffff, 0x35, 0x40000000, 0xffffffffffffffff, 0x0) 05:58:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000200001000000000000007f1102"], 0x28}}, 0x0) 05:58:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') read$char_usb(r0, &(0x7f0000000140)=""/191, 0xbf) 05:58:02 executing program 0: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @local, @multicast2}}}], 0x20}, 0x0) 05:58:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 05:58:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='gid_map\x00') read$char_usb(r0, &(0x7f0000000100)=""/187, 0xbb) 05:58:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) [ 128.207841] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:58:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000200001000000000000007f1102"], 0x28}}, 0x0) 05:58:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') read$char_usb(r0, &(0x7f0000000140)=""/191, 0xbf) 05:58:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x1c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}}, 0x1c}}, 0x0) 05:58:02 executing program 3: perf_event_open(&(0x7f000000be80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x4) 05:58:02 executing program 0: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0xfffffffffffffffe, 0x0) 05:58:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x1c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}}, 0x1c}}, 0x0) 05:58:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="5800000024000b0e00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000002800020000000000040000000000000000010000ffffffffff"], 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000240)="0503460008003e0000000200c52c", 0xe, 0x0, 0x0, 0x0) 05:58:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') read$char_usb(r0, &(0x7f0000000180)=""/211, 0xd3) 05:58:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x10100, 0x0) [ 128.348439] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 128.377265] WARNING: can't dereference registers at 0000000000000472 for ip entry_SYSCALL_64_after_hwframe+0x46/0xbb 05:58:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) 05:58:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x2, 0x6, 0x0, 0x0, 0x2, 0x0, 0x70bd22}, 0x10}}, 0x0) 05:58:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000b080)={0x0, 0x0, &(0x7f000000b040)={&(0x7f000000afc0)=@ipv4_delrule={0x1c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}}, 0x1c}}, 0x0) 05:58:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000080)=@RTM_DELMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r1}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@ip4=@loopback}}}]}, 0x38}}, 0x0) 05:58:02 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 05:58:02 executing program 2: socketpair(0x0, 0x8000c, 0x0, 0x0) 05:58:02 executing program 3: shmat(0x0, &(0x7f0000f45000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x6000) 05:58:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000200001000000000000007f110204"], 0x28}}, 0x0) 05:58:02 executing program 1: memfd_create(&(0x7f0000000080)='H\x1fK\x7f\xf9\xff\xf5\xbf=\xb57\x91\x80>u\x19\xfe9\xe0\xf2)D\xf2\xee\xc8,`tY\xd9C\xfe\xbc\x80p\"\xdb\x19U\xcd\xa6\xd0\no\xf7\v6\xb6\xca%S\xdc\x15\xfd\xc4\x82\tP\x06\xb5\x06,n\x99>\xa4\x119\xa5E\xfb\x1c56\x84C\xb1\xf2\x98\xdaB\a\x91\x90\x9fF\xa2\xa6,\xaf\x03\xe5_9\xc8:}\xabP\x1cO\x87\\\x1a\xb4\v\x1bm\xcc\x89Nn1t\x18\a\x03\x8f\xd1\xcb\x9a', 0x0) [ 128.549185] PF_BRIDGE: br_mdb_parse() with non-bridge 05:58:02 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x20}, 0x0) 05:58:02 executing program 1: r0 = socket(0x2, 0x2, 0x0) bind$alg(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) r2 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000140)={@local, 0x0, r3}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @remote, 0x2}, @xdp={0x2c, 0x1, r1, 0x33}, @xdp={0x2c, 0x8, r3, 0x32}, 0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='bridge_slave_0\x00', 0x8, 0x1, 0x101}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000005040)='/dev/full\x00', 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000580)={'\x00', {0x2, 0x0, @local}}) write$FUSE_ATTR(r4, 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000500)={&(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="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"], 0x2e0}, 0x1, 0x0, 0x0, 0x4000}, 0x40800) 05:58:02 executing program 4: r0 = socket(0x2, 0x3, 0x4) bind$alg(r0, 0x0, 0x0) [ 128.593998] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 128.613770] PF_BRIDGE: br_mdb_parse() with non-bridge 05:58:02 executing program 3: shmat(0x0, &(0x7f0000f45000/0x2000)=nil, 0x7000) r0 = shmat(0x0, &(0x7f0000c87000/0x3000)=nil, 0x6000) pkey_mprotect(&(0x7f0000c79000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) shmdt(r0) 05:58:02 executing program 5: sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000003c0)=@expire={0xf8, 0x18, 0x1, 0x0, 0x0, {{{@in=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, @in6=@private2}}}, 0xf8}}, 0x0) 05:58:03 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) 05:58:03 executing program 5: sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:03 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) read$FUSE(r0, 0x0, 0x0) 05:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000200001"], 0x28}}, 0x0) 05:58:03 executing program 4: timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x3938700}, {0x0, r0+60000000}}, &(0x7f00000001c0)) 05:58:03 executing program 2: r0 = socket$unix(0x1, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 05:58:03 executing program 4: request_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0) 05:58:03 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create(0x66e5a57e) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x70000000}) 05:58:03 executing program 3: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x20}, 0x0) 05:58:03 executing program 5: sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:03 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x46) 05:58:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 05:58:03 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x56}, 0x10}}, 0x0) 05:58:03 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10}, 0x10}}, 0x0) 05:58:03 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:03 executing program 0: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x20}, 0x0) 05:58:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000004f80)=[{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000000)="9a", 0x1}, {&(0x7f00000000c0)="f8", 0x1}], 0x2, &(0x7f00000015c0)=[@op={0x18}, @op={0x18}], 0x30}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}], 0x2, 0x0) 05:58:03 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30}, 0x30) 05:58:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={{0x77359400}}, 0x0) 05:58:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6, &(0x7f0000000080)=0xfffffffffffffe6e) 05:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001300b78ac49e25d4f02b130d929ecc1d01"], 0x20}}, 0x0) 05:58:03 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:03 executing program 2: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000001c40)) 05:58:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000001dc0)=[{{0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000000340)=""/38, 0x26}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000003e0001"], 0x38}}, 0x0) 05:58:03 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(r0, &(0x7f000000b480)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000004440)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}], 0x1, 0x0) 05:58:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(nhpoly1305-neon)\x00'}, 0x58) 05:58:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, 0x0, 0x0) 05:58:03 executing program 2: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000380)='maps\x00') read$char_usb(r1, &(0x7f0000000140)=""/174, 0xae) 05:58:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000004f80)=[{0x0, 0x0, &(0x7f0000001540)=[{0x0}, {&(0x7f00000000c0)="f8", 0x1}, {&(0x7f0000000280)='z', 0x1}], 0x3, &(0x7f00000015c0)=[@op={0x18}, @op={0x18}], 0x30}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}], 0x2, 0x0) 05:58:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, 0x0, 0x0) 05:58:03 executing program 3: shmat(0x0, &(0x7f0000f45000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000f46000/0x2000)=nil, 0x4000) 05:58:03 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) write$input_event(r0, 0x0, 0x0) 05:58:03 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)) 05:58:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005e6"], 0x38}}, 0x0) 05:58:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, 0x0, 0x0) 05:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000001ac0)=@ipmr_delroute={0x1c, 0x19, 0x209}, 0x1c}}, 0x0) 05:58:03 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000f45000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) 05:58:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') read$char_usb(r0, &(0x7f0000000140)=""/191, 0xbf) read$char_usb(r0, 0x0, 0x0) 05:58:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 05:58:03 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) sendmsg$sock(r0, 0x0, 0x0) 05:58:03 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000), 0x5f) 05:58:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005e6"], 0x38}}, 0x0) [ 129.194709] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 129.216073] PF_BRIDGE: br_mdb_parse() with unknown ifindex 05:58:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3800000000010104000000000000000002000000240002801400018008"], 0x38}}, 0x0) 05:58:03 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x20201, 0x0) 05:58:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_cache\x00') read$char_usb(r0, &(0x7f0000000140)=""/191, 0xbf) read$char_usb(r0, 0x0, 0x0) 05:58:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) [ 129.296861] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 129.324196] PF_BRIDGE: br_mdb_parse() with unknown ifindex 05:58:03 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005e6"], 0x38}}, 0x0) 05:58:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_cache\x00') read$char_usb(r0, &(0x7f0000000140)=""/191, 0xbf) read$char_usb(r0, 0x0, 0x0) 05:58:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 05:58:03 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x3250115, 0x0) 05:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="20000000130001"], 0x20}}, 0x0) [ 129.445275] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 129.482322] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 05:58:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 129.506765] PF_BRIDGE: br_mdb_parse() with unknown ifindex [ 129.513354] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:58:03 executing program 4: readlinkat(0xffffffffffffffff, &(0x7f0000000100)='\x00', &(0x7f0000000140)=""/18, 0x12) 05:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 05:58:03 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:03 executing program 1: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:58:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005e6"], 0x38}}, 0x0) 05:58:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 05:58:03 executing program 2: r0 = socket(0x2, 0x3, 0x4) socket$inet6(0xa, 0x3, 0x6) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @empty}}}], 0x20}, 0x0) 05:58:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:03 executing program 3: r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/ipc\x00') 05:58:04 executing program 4: clock_gettime(0x0, &(0x7f0000001c40)) [ 129.664537] PF_BRIDGE: br_mdb_parse() with unknown ifindex 05:58:04 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005e6"], 0x38}}, 0x0) 05:58:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 05:58:04 executing program 2: r0 = socket(0x2, 0x3, 0x4) socket$inet6(0xa, 0x3, 0x6) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 3: r0 = socket(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) 05:58:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 05:58:04 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005e6"], 0x38}}, 0x0) 05:58:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:04 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@getsa={0x28, 0x12, 0x1, 0x0, 0x0, {@in=@remote}}, 0x28}}, 0x0) 05:58:04 executing program 2: r0 = socket(0x2, 0x3, 0x4) socket$inet6(0xa, 0x3, 0x6) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 3: r0 = socket(0x2, 0x3, 0x4) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast2}}}], 0x20}, 0x0) 05:58:04 executing program 4: r0 = socket(0x26, 0x5, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 05:58:04 executing program 2: r0 = socket(0x2, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005e6"], 0x38}}, 0x0) 05:58:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:04 executing program 4: r0 = socket(0x2, 0x3, 0x4) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x10}}], 0x10}, 0x0) 05:58:04 executing program 1: socketpair(0xa, 0x3, 0x5, 0x0) 05:58:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') read$char_usb(r0, &(0x7f0000000180)=""/250, 0xb4) 05:58:04 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005e6"], 0x38}}, 0x0) 05:58:04 executing program 2: r0 = socket(0x2, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000067c0)=[{{&(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/16, 0x10}, {&(0x7f0000000140)=""/112, 0x70}, {&(0x7f00000001c0)=""/101, 0x65}], 0x3, &(0x7f0000000280)=""/102, 0x66}}, {{&(0x7f0000000300)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/237, 0xed}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/181, 0xb5}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000003600)=""/211, 0xd3}], 0x8, &(0x7f0000003780)=""/119, 0x77}}, {{&(0x7f0000003800)=@pppoe, 0x80, &(0x7f00000059c0)=[{&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)}, {&(0x7f00000048c0)=""/213, 0xd5}, {&(0x7f00000049c0)=""/4096, 0x1000}], 0x4}}, {{&(0x7f0000005a00)=@sco, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005a80)=""/17, 0x11}, {&(0x7f0000005ac0)=""/222, 0xde}, {&(0x7f0000005bc0)=""/169, 0xa9}, {&(0x7f0000005c80)=""/56, 0x38}, {&(0x7f0000005cc0)=""/127, 0x7f}], 0x5, &(0x7f0000005dc0)=""/188, 0xbc}}, {{0x0, 0x0, &(0x7f0000005f80), 0x0, &(0x7f0000005fc0)=""/40, 0x28}}, {{&(0x7f0000006000)=@vsock, 0x80, &(0x7f0000006400)=[{&(0x7f0000006080)=""/35, 0x23}, {&(0x7f00000060c0)=""/86, 0x56}, {&(0x7f0000006140)=""/49, 0x31}, {&(0x7f0000006180)=""/38, 0x26}, {&(0x7f00000061c0)=""/94, 0x5e}, {&(0x7f0000006240)=""/97, 0x61}, {&(0x7f00000062c0)=""/248, 0xf8}, {&(0x7f00000063c0)}], 0x8, &(0x7f0000006480)=""/32, 0x20}}, {{&(0x7f00000064c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0xca, &(0x7f0000006700)=[{&(0x7f0000006540)=""/201, 0xc9}, {&(0x7f0000006640)=""/138, 0x8a}], 0x2, &(0x7f0000006740)=""/94, 0x5e}}], 0x7, 0x0, 0x0) 05:58:04 executing program 3: getresuid(&(0x7f0000000000), &(0x7f0000002480), &(0x7f0000000080)) 05:58:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, 0x3, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 05:58:04 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:04 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005e6"], 0x38}}, 0x0) 05:58:04 executing program 2: r0 = socket(0x2, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xfefb) 05:58:04 executing program 1: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010100}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @local, @multicast1}}}], 0x20}, 0x0) 05:58:04 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005e6"], 0x38}}, 0x0) 05:58:04 executing program 3: mknodat(0xffffffffffffffff, 0x0, 0x4801, 0x0) 05:58:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}]}, 0x1c}}, 0x0) 05:58:04 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 05:58:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000780)="cc", 0x1, 0xfffffffffffffffb) keyctl$read(0xb, r0, 0x0, 0x0) 05:58:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 05:58:04 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 05:58:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}]}, 0x1c}}, 0x0) 05:58:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, 0x1, 0x8, 0x301}, 0x14}}, 0x0) 05:58:04 executing program 2: r0 = socket(0x0, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000013000100000000000006000000133beafb"], 0x20}}, 0x0) 05:58:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 05:58:04 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:04 executing program 2: r0 = socket(0x0, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/dev_mcast\x00') read$char_usb(r0, &(0x7f00000002c0)=""/202, 0xca) 05:58:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, 0x0}, 0x0) 05:58:04 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000340)) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) read$FUSE(r0, &(0x7f0000001500)={0x2020}, 0x2020) 05:58:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}]}, 0x1c}}, 0x0) 05:58:04 executing program 2: r0 = socket(0x0, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x40010121, 0x0, 0x47) 05:58:04 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, 0x0}, 0x0) 05:58:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) 05:58:04 executing program 1: pselect6(0x8, &(0x7f0000000080)={0x7}, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0}) 05:58:04 executing program 2: r0 = socket(0x2, 0x0, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, 0x0}, 0x0) 05:58:04 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:04 executing program 3: r0 = socket(0x1, 0x5, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0, 0x8e4}}, 0x0) 05:58:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 05:58:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={0x0, 0x38}}, 0x0) 05:58:05 executing program 2: r0 = socket(0x2, 0x0, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) fcntl$dupfd(r1, 0x0, r0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 05:58:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/ip_mr_vif\x00') read$char_usb(r0, &(0x7f0000000400)=""/75, 0x4b) 05:58:05 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x109040, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) 05:58:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000380)) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={0x0, 0x38}}, 0x0) 05:58:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') read$char_usb(r0, &(0x7f0000000180)=""/224, 0xe0) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) fcntl$dupfd(r1, 0x0, r0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 05:58:05 executing program 2: r0 = socket(0x2, 0x0, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) fcntl$dupfd(r1, 0x0, r0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 05:58:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000003c00)={&(0x7f0000003a80), 0xc, &(0x7f0000003bc0)={0x0}}, 0x0) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={0x0, 0x38}}, 0x0) 05:58:05 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f0000000200), 0x0, &(0x7f0000000280)={0x9}, &(0x7f0000000300), 0x0) 05:58:05 executing program 3: sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x6) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 05:58:05 executing program 2: r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[], 0x38}}, 0x0) 05:58:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 05:58:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2004114, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 05:58:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') read$char_usb(r0, &(0x7f0000000140)=""/191, 0xbf) read$char_usb(r0, 0x0, 0x0) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[], 0x38}}, 0x0) 05:58:05 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x3938700}}, 0x0) 05:58:05 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000001f80)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xffffffb3, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f0000001800)='^', 0x1}], 0x3}], 0x1, 0x0) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[], 0x38}}, 0x0) 05:58:05 executing program 2: r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 05:58:05 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@getsa={0x28, 0x12, 0x1, 0x0, 0x0, {@in=@remote, 0x0, 0x2, 0x6c}}, 0x28}}, 0x0) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x38}}, 0x0) 05:58:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) 05:58:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x50, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0xb, 0x3, @dev}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x50}}, 0x0) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:05 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x54001c1d, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) 05:58:05 executing program 3: r0 = getpgid(0x0) rt_sigqueueinfo(r0, 0x0, &(0x7f0000000700)={0x0, 0x0, 0xfffffffb}) 05:58:05 executing program 2: r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x6c}, 0x14}}, 0x0) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x38}}, 0x0) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:05 executing program 1: r0 = socket(0xa, 0x3, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 05:58:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/37, 0x25) 05:58:05 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x38}}, 0x0) 05:58:05 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x0, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:05 executing program 1: r0 = socket(0x2, 0x3, 0x4) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000055000100000000"], 0x38}}, 0x0) 05:58:05 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) 05:58:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter\x00') read$char_usb(r0, &(0x7f0000000140)=""/191, 0xbf) read$char_usb(r0, 0x0, 0x0) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000055000100000000"], 0x38}}, 0x0) 05:58:05 executing program 3: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 05:58:05 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x0, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:05 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:05 executing program 1: r0 = socket(0x2, 0x3, 0x4) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @empty}, 0x10, 0x0}, 0x4890) 05:58:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000055000100000000"], 0x38}}, 0x0) 05:58:05 executing program 3: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0xffffffffffffffff) 05:58:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:06 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0) 05:58:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000055000100000000000000000007"], 0x38}}, 0x0) 05:58:06 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:06 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x0, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) [ 131.746983] PF_BRIDGE: br_mdb_parse() with invalid ifindex 05:58:06 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000001040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={{0x18, 0x1, 0x1, [r1, r2]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x38}], 0x1, 0x0) 05:58:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000055000100000000000000000007"], 0x38}}, 0x0) 05:58:06 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:06 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) [ 131.844380] PF_BRIDGE: br_mdb_parse() with invalid ifindex 05:58:06 executing program 3: mkdirat(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) 05:58:06 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000055000100000000000000000007"], 0x38}}, 0x0) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000001d000100"/20, @ANYBLOB="000000000a000200bb"], 0x34}}, 0x0) 05:58:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:06 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2005116, 0x0) 05:58:06 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) [ 131.960535] nla_parse: 4 callbacks suppressed [ 131.960541] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 131.999294] PF_BRIDGE: br_mdb_parse() with invalid ifindex 05:58:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000055000100000000000000000007000000"], 0x38}}, 0x0) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:06 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x2, 0x6, 0xfe, 0x0, 0x2, 0x0, 0x70bd22}, 0x10}}, 0x0) 05:58:06 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) [ 132.079329] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 132.102392] PF_BRIDGE: br_mdb_parse() with invalid ifindex 05:58:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000055000100000000000000000007000000"], 0x38}}, 0x0) 05:58:06 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cmdline\x00') read$char_usb(r0, &(0x7f0000000a80)=""/132, 0x84) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) sendmsg$alg(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/24, 0x18) 05:58:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:06 executing program 2: r0 = socket(0x2, 0x3, 0x4) socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:06 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:06 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') [ 132.186188] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 132.215521] PF_BRIDGE: br_mdb_parse() with invalid ifindex 05:58:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000055000100000000000000000007000000"], 0x38}}, 0x0) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) sendmsg$alg(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/24, 0x18) 05:58:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="020f200205"], 0x28}}, 0x0) recvmsg(r0, &(0x7f0000000dc0)={0x0, 0x0, 0x0}, 0x62) 05:58:06 executing program 2: r0 = socket(0x2, 0x3, 0x4) socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:06 executing program 5: ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0xfd18) 05:58:06 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) [ 132.315352] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 132.328875] PF_BRIDGE: br_mdb_parse() with invalid ifindex 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) sendmsg$alg(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/24, 0x18) 05:58:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005"], 0x38}}, 0x0) 05:58:06 executing program 2: r0 = socket(0x2, 0x3, 0x4) socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$sock(r0, &(0x7f0000002b40)={&(0x7f0000002880)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000002a80)=[{0x0}, {0x0}], 0x2, &(0x7f0000002ac0)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}, 0x20000041) 05:58:06 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:06 executing program 5: ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0xfd18) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:06 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:06 executing program 5: ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0xfd18) [ 132.446050] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 05:58:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getpeername(r0, &(0x7f0000001f00)=@l2tp6={0xa, 0x0, 0x0, @private1}, &(0x7f00000001c0)=0x80) 05:58:06 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, 0x0) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @empty}}}], 0x20}, 0x0) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) [ 132.498500] PF_BRIDGE: br_mdb_parse() with non-bridge 05:58:06 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005"], 0x38}}, 0x0) 05:58:06 executing program 5: r0 = syz_open_dev$evdev(0x0, 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:06 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000001f80)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) 05:58:06 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, 0x0) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @empty}}}], 0x20}, 0x0) 05:58:06 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:06 executing program 3: socketpair(0x11, 0x2, 0x4, 0x0) 05:58:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) [ 132.606059] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 05:58:06 executing program 5: r0 = syz_open_dev$evdev(0x0, 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:06 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) [ 132.652158] PF_BRIDGE: br_mdb_parse() with non-bridge 05:58:07 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, 0x0) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @empty}}}], 0x20}, 0x0) 05:58:07 executing program 5: r0 = syz_open_dev$evdev(0x0, 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005ec0)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000005500010000000000000000000700000005"], 0x38}}, 0x0) 05:58:07 executing program 2: socket(0x2, 0x3, 0x4) r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:07 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r0, &(0x7f0000000080)=""/24, 0x18) 05:58:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000280)={0x14, 0x1, 0x5, 0x3}, 0x14}}, 0x0) 05:58:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:07 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:07 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r0, &(0x7f0000000080)=""/24, 0x18) [ 132.758474] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 05:58:07 executing program 3: mq_open(&(0x7f0000000040)='+.\x19!\t\x00', 0xc1, 0x0, 0x0) 05:58:07 executing program 2: socket(0x2, 0x3, 0x4) r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) [ 132.812605] PF_BRIDGE: br_mdb_parse() with non-bridge 05:58:07 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:58:07 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000038c0)={'ip6gre0\x00'}) 05:58:07 executing program 2: socket(0x2, 0x3, 0x4) r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private, @empty}}}], 0x20}, 0x0) 05:58:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:07 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r0, &(0x7f0000000080)=""/24, 0x18) 05:58:07 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, 0x0, 0x0) 05:58:07 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:07 executing program 3: clock_nanosleep(0x0, 0x1, &(0x7f0000000480), 0x0) 05:58:07 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, 0x0, 0x0) 05:58:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002300)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r0, &(0x7f0000000040)=@un=@abs, 0x80) 05:58:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, 0x0, 0x0) 05:58:07 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:07 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, 0x0, 0x0) 05:58:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="020f"], 0xd8}}, 0x0) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:08 executing program 0: socket$inet(0x2, 0x1, 0x5) 05:58:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002300)={0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) 05:58:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 3: getrusage(0x1, &(0x7f0000000280)) 05:58:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x2c0801, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/kcm\x00') ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f00000000c0)={0x2f, 0x3}) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80), 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80), 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000000)=@un=@file={0x1, './file0\x00'}, 0x80) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80), 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @empty}}}], 0x20}, 0x0) 05:58:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0}, 0x0) 05:58:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002280)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0xc, 0x0, "008052d44a72209df3d05168782af215f0b33b31de6aa4892f4f52ea4a1221fe0c4b0d4054e17e77dd37196bb74050c8718f181f8b2d9185ba5a98676e498bc19ef13436eb56493f475d8cba4e93a525"}, 0xd8) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:08 executing program 0: futex(&(0x7f0000000000)=0x2, 0x4, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080), 0x2) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0}, 0x0) 05:58:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x4, &(0x7f00000021c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0xfd18) 05:58:08 executing program 0: syz_open_dev$ttys(0xc, 0x2, 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x4, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 05:58:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0xfd18) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0}, 0x0) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 3: r0 = eventfd(0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 05:58:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)}, 0x0) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0xfd18) 05:58:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:08 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)}, 0x0) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$SIOCGSTAMPNS(r0, 0xc020660b, 0x0) 05:58:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, 0x0, 0x0) 05:58:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) read$alg(r1, &(0x7f0000000080)=""/24, 0x18) 05:58:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:09 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)}, 0x0) 05:58:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/24, 0x18) 05:58:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, 0x0, 0x0) 05:58:09 executing program 0: r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x44) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x70}}, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000071"], 0x0) 05:58:09 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, 0x0, 0x0) 05:58:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/24, 0x18) 05:58:09 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040), 0xfd18) 05:58:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/24, 0x18) 05:58:09 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @empty}}}], 0x20}, 0x0) 05:58:09 executing program 0: r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x44) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x70}}, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000071"], 0x0) 05:58:09 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:09 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 05:58:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, 0x0, 0x0) 05:58:09 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @empty}}}], 0x20}, 0x0) 05:58:09 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:09 executing program 0: r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x44) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x70}}, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000071"], 0x0) 05:58:09 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000340)) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, 0x0, 0x0) 05:58:09 executing program 2: r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) sendmsg$inet(r0, &(0x7f0000002d40)={&(0x7f0000001b80)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @empty}}}], 0x20}, 0x0) 05:58:09 executing program 0: r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x44) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x70}}, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000071"], 0x0) 05:58:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) read$alg(r1, 0x0, 0x0) 05:58:09 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:09 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000340)) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:09 executing program 0: r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x44) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000071"], 0x0) 05:58:09 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:09 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000340)) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:09 executing program 0: r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x44) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000071"], 0x0) 05:58:09 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:09 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:09 executing program 0: r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x44) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000071"], 0x0) 05:58:09 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:09 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:09 executing program 0: r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000071"], 0x0) 05:58:09 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) fcntl$dupfd(r1, 0x0, r0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 05:58:10 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:10 executing program 0: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000071"], 0x0) 05:58:10 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) fcntl$dupfd(r1, 0x0, r0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 05:58:10 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) 05:58:10 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 05:58:10 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) fcntl$dupfd(r1, 0x0, r0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 05:58:10 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) 05:58:10 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 05:58:10 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 05:58:10 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 05:58:10 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) 05:58:10 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 05:58:10 executing program 0: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) 05:58:10 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 05:58:10 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 05:58:10 executing program 0: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) 05:58:10 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, 0x0, 0x0) 05:58:10 executing program 0: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) 05:58:10 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 05:58:10 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, 0x0, 0x0) 05:58:10 executing program 0: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) 05:58:10 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, 0x0, 0x0) 05:58:10 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = openat$cgroup_procs(r1, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0