Starting Update UTMP about System Runlevel Changes... [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.29' (ECDSA) to the list of known hosts. 2020/10/18 15:19:18 fuzzer started 2020/10/18 15:19:18 dialing manager at 10.128.0.105:40773 2020/10/18 15:19:19 syscalls: 3308 2020/10/18 15:19:19 code coverage: enabled 2020/10/18 15:19:19 comparison tracing: enabled 2020/10/18 15:19:19 extra coverage: extra coverage is not supported by the kernel 2020/10/18 15:19:19 setuid sandbox: enabled 2020/10/18 15:19:19 namespace sandbox: enabled 2020/10/18 15:19:19 Android sandbox: enabled 2020/10/18 15:19:19 fault injection: enabled 2020/10/18 15:19:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/10/18 15:19:19 net packet injection: enabled 2020/10/18 15:19:19 net device setup: enabled 2020/10/18 15:19:19 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/10/18 15:19:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/10/18 15:19:19 USB emulation: /dev/raw-gadget does not exist 2020/10/18 15:19:19 hci packet injection: enabled 2020/10/18 15:19:19 wifi device emulation: enabled 15:21:15 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) syzkaller login: [ 156.452025] audit: type=1400 audit(1603034475.614:8): avc: denied { execmem } for pid=6505 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 15:21:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) ioctl$SNDCTL_DSP_SPEED(r2, 0xc0045002, &(0x7f0000000080)) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) sendfile(r2, r1, 0x0, 0x1c01) 15:21:15 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) socket$inet6_sctp(0xa, 0x0, 0x84) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x28004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x10006, 0xf186}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) socket$netlink(0x10, 0x3, 0x0) 15:21:16 executing program 3: syz_open_dev$usbfs(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x22, 0x2, 0x24) bind$isdn_base(r1, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, @random}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r2, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc010}, 0x40000) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="580400", @ANYRES16=0x0], 0x458}, 0x1, 0x0, 0x0, 0x800}, 0x20040085) 15:21:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 15:21:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x2d, 0x0, &(0x7f0000000680)) [ 157.659523] IPVS: ftp: loaded support on port[0] = 21 [ 157.830435] IPVS: ftp: loaded support on port[0] = 21 [ 157.835372] chnl_net:caif_netlink_parms(): no params data found [ 158.004010] IPVS: ftp: loaded support on port[0] = 21 [ 158.026814] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.034533] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.041622] device bridge_slave_0 entered promiscuous mode [ 158.052316] chnl_net:caif_netlink_parms(): no params data found [ 158.061593] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.068663] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.076085] device bridge_slave_1 entered promiscuous mode [ 158.127277] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 158.155195] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 158.211148] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.212861] IPVS: ftp: loaded support on port[0] = 21 [ 158.219288] team0: Port device team_slave_0 added [ 158.232748] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 158.240573] team0: Port device team_slave_1 added [ 158.291488] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 158.299465] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.331050] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 158.379743] IPVS: ftp: loaded support on port[0] = 21 [ 158.395442] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 158.401698] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.428732] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 158.441440] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 158.477726] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 158.498851] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.506699] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.514478] device bridge_slave_0 entered promiscuous mode [ 158.532084] IPVS: ftp: loaded support on port[0] = 21 [ 158.549468] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.555976] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.563792] device bridge_slave_1 entered promiscuous mode [ 158.590472] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 158.611765] device hsr_slave_0 entered promiscuous mode [ 158.617686] device hsr_slave_1 entered promiscuous mode [ 158.631476] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 158.653925] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 158.660663] chnl_net:caif_netlink_parms(): no params data found [ 158.682763] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.692067] team0: Port device team_slave_0 added [ 158.697569] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 158.719122] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 158.729099] team0: Port device team_slave_1 added [ 158.755883] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 158.762131] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.787473] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 158.801782] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 158.808683] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.835003] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 158.886084] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 158.917754] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 159.009695] device hsr_slave_0 entered promiscuous mode [ 159.016111] device hsr_slave_1 entered promiscuous mode [ 159.033757] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.040165] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.048371] device bridge_slave_0 entered promiscuous mode [ 159.067965] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 159.074776] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.081133] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.088253] device bridge_slave_1 entered promiscuous mode [ 159.097820] chnl_net:caif_netlink_parms(): no params data found [ 159.125208] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 159.155552] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.199502] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 159.245150] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 159.252474] team0: Port device team_slave_0 added [ 159.265025] chnl_net:caif_netlink_parms(): no params data found [ 159.302556] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 159.311093] team0: Port device team_slave_1 added [ 159.351748] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 159.358042] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 159.386914] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 159.401675] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 159.409577] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 159.435074] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 159.471566] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 159.498739] chnl_net:caif_netlink_parms(): no params data found [ 159.512619] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 159.549567] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 159.572763] device hsr_slave_0 entered promiscuous mode [ 159.578643] device hsr_slave_1 entered promiscuous mode [ 159.614511] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 159.637853] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.644615] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.651604] device bridge_slave_0 entered promiscuous mode [ 159.661734] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.670663] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.679504] device bridge_slave_1 entered promiscuous mode [ 159.686623] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 159.693928] Bluetooth: hci0: command 0x0409 tx timeout [ 159.751388] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.763715] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.770846] device bridge_slave_0 entered promiscuous mode [ 159.782759] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.789934] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.798642] device bridge_slave_1 entered promiscuous mode [ 159.808635] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.852762] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 159.853113] Bluetooth: hci1: command 0x0409 tx timeout [ 159.888540] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.911614] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 159.918892] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.926476] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.935321] device bridge_slave_0 entered promiscuous mode [ 159.946435] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 159.969094] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 159.980752] team0: Port device team_slave_0 added [ 159.994408] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.004007] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.010344] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.013189] Bluetooth: hci2: command 0x0409 tx timeout [ 160.023670] device bridge_slave_1 entered promiscuous mode [ 160.039735] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 160.047607] team0: Port device team_slave_0 added [ 160.053505] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 160.060667] team0: Port device team_slave_1 added [ 160.096046] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 160.105290] team0: Port device team_slave_1 added [ 160.121076] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 160.130131] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 160.140162] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.146471] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.171779] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 160.181669] Bluetooth: hci3: command 0x0409 tx timeout [ 160.190319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.196700] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.223304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.243524] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 160.253521] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 160.266513] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.275990] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.301255] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 160.311913] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.326510] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 160.341665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.344172] Bluetooth: hci4: command 0x0409 tx timeout [ 160.349354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.362107] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.369085] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.394797] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.408487] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.425622] Bluetooth: hci5: command 0x0409 tx timeout [ 160.433090] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 160.440715] team0: Port device team_slave_0 added [ 160.448816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 160.458431] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 160.466921] team0: Port device team_slave_1 added [ 160.480643] device hsr_slave_0 entered promiscuous mode [ 160.487148] device hsr_slave_1 entered promiscuous mode [ 160.494250] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 160.500396] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.526182] device hsr_slave_0 entered promiscuous mode [ 160.531985] device hsr_slave_1 entered promiscuous mode [ 160.555011] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 160.562417] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.569200] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.594728] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 160.607719] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 160.617703] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 160.626922] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 160.635217] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 160.642595] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.649169] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.674509] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.686048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.694675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.702275] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.708757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.716277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.732347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 160.748532] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.759126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.772234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.781256] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.787678] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.797966] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 160.806210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 160.824871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 160.846561] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.870619] device hsr_slave_0 entered promiscuous mode [ 160.878180] device hsr_slave_1 entered promiscuous mode [ 160.884045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.896751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 160.916954] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 160.924742] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 160.931963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.943468] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 160.950446] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 160.978581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.987002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.002167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 161.012356] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 161.021484] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.029238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.037491] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.045278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.052089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.094269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 161.103514] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 161.109615] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.133583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.141103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.154796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 161.168005] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 161.180265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.191642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.200553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.208606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.216537] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.222929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.229944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.253643] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 161.259651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.274779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 161.327420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.335313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.343637] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.350074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.359484] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 161.369614] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 161.380141] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.399572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.410733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 161.420798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 161.429367] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 161.437891] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 161.448221] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 161.459648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.467828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.476129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.484548] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 161.491199] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 161.501270] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 161.511081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 161.519524] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 161.529948] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 161.543218] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.550224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.564352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.571979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.579972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.587636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.595056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.606414] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 161.617391] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 161.624504] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.634586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.642179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.652512] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 161.658848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.669194] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.678528] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 161.691904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 161.700277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.708410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.716690] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.723092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.729823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.738024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.745657] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.751977] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.766729] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 161.774500] Bluetooth: hci0: command 0x041b tx timeout [ 161.795859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 161.806642] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 161.813090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.820145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.831672] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 161.840249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 161.848385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.879217] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 161.896420] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 161.910805] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 161.922532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.932872] Bluetooth: hci1: command 0x041b tx timeout [ 161.939430] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 161.946386] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 161.958941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 161.973655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.980522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.988761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.999349] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 162.011365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 162.022387] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 162.032062] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.040870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.048806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.057045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.065406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.077286] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.086791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 162.094233] Bluetooth: hci2: command 0x041b tx timeout [ 162.101765] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 162.117077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.125181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.132524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.140013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.149428] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 162.158265] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 162.165747] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 162.173921] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 162.179925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.200447] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 162.218586] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 162.231461] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 162.248367] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 162.261630] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.268435] Bluetooth: hci3: command 0x041b tx timeout [ 162.272459] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 162.284937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 162.294816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.302542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.310285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.318528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.326654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.334675] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.341010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.348248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.355536] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.362491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.380016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.386736] device veth0_vlan entered promiscuous mode [ 162.400449] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 162.411845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.419673] Bluetooth: hci4: command 0x041b tx timeout [ 162.426561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 162.434501] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 162.442010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.450410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.458464] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.464872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.474494] device veth1_vlan entered promiscuous mode [ 162.480601] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 162.492105] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 162.499246] Bluetooth: hci5: command 0x041b tx timeout [ 162.506779] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 162.516866] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 162.524224] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 162.533478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 162.548661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 162.556506] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 162.564341] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 162.571465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.579651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.587030] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 162.593901] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 162.600561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.608676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.619446] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 162.626267] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.635373] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 162.647607] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 162.655628] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 162.662365] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 162.672305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 162.686352] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.693436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.700346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.708316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.716513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.726654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 162.737174] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 162.748777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 162.758266] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.766525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.774728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.782237] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.788640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.795661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.803677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.811524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.821780] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 162.828045] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.836995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 162.851896] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 162.865637] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 162.879062] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 162.885768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.894098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.901942] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.908353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.915522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.923491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.931051] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.937435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.944550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.951852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.960922] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 162.970442] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 162.981229] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 162.991432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 163.002416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 163.011280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.019586] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.027157] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.034538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.042099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.050624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.058754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.066551] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.073078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.079996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.088004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.096121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.103885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.111262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.121776] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 163.131267] device veth0_vlan entered promiscuous mode [ 163.140042] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 163.148543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.162327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.170509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.186382] device veth0_macvtap entered promiscuous mode [ 163.194455] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 163.212035] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 163.218978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.232416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.246686] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 163.258641] device veth1_macvtap entered promiscuous mode [ 163.268126] device veth1_vlan entered promiscuous mode [ 163.281259] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 163.289027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.299155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 163.309796] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 163.319118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 163.335700] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 163.344685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.352477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.362930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.370593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.378783] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 163.386238] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 163.399476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 163.409960] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 163.420517] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 163.431824] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 163.442127] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 163.452370] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 163.462465] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 163.469370] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.476964] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.484189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.491841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.500506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.508599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.516628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.524210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.531588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.539005] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.549471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 163.559802] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 163.567925] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 163.577543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 163.590863] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 163.599910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.609359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.617215] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.625468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.634270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.643378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.653939] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 163.663483] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.669808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.681176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.690113] device veth0_vlan entered promiscuous mode [ 163.703409] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 163.712375] device veth0_macvtap entered promiscuous mode [ 163.719320] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 163.729783] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 163.737600] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 163.748643] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 163.755408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.763599] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 163.780561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.788741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.796789] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.804721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.812481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.820276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.828470] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 163.842338] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 163.845259] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 163.845291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.861698] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 163.871544] device veth1_macvtap entered promiscuous mode [ 163.889315] Bluetooth: hci0: command 0x040f tx timeout [ 163.895527] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 163.903742] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 163.910837] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 163.923414] device veth1_vlan entered promiscuous mode [ 163.929917] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 163.966534] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 163.974053] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 163.981419] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.991222] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 163.998510] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 164.005819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 164.014389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.024238] Bluetooth: hci1: command 0x040f tx timeout [ 164.027179] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.037591] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 164.054766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 164.064597] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 164.078580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 164.086291] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 164.096362] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 164.116382] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 164.130014] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.138701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 164.154599] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 164.165717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 164.176796] Bluetooth: hci2: command 0x040f tx timeout [ 164.183145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.194175] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 164.201544] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 164.210229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 164.218654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.226768] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 164.235606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 164.246425] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 164.261555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 164.272227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.289422] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 164.296661] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 164.308095] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 164.322010] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 164.329342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 164.338851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 164.342904] Bluetooth: hci3: command 0x040f tx timeout [ 164.347291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.359366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.370514] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 164.377841] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 164.388857] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 164.405046] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 164.415725] device veth0_macvtap entered promiscuous mode [ 164.421954] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 164.437033] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 164.454079] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 164.460971] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 164.471112] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 164.479544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 164.488544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.498308] Bluetooth: hci4: command 0x040f tx timeout [ 164.506101] device veth1_macvtap entered promiscuous mode [ 164.512282] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 164.525027] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 164.534613] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 164.558922] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 164.570118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 164.578698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.583082] Bluetooth: hci5: command 0x040f tx timeout [ 164.596737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 164.604796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.613701] device veth0_vlan entered promiscuous mode [ 164.620381] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 164.629387] device veth0_vlan entered promiscuous mode [ 164.638665] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.645941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.666033] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.674830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.687130] device veth1_vlan entered promiscuous mode [ 164.693958] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 164.703827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 164.716105] device veth1_vlan entered promiscuous mode [ 164.722249] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 164.744241] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 164.751238] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 164.766129] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 164.775181] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 164.811530] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 164.825205] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.835118] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 164.845376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.856309] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 164.864991] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 164.873552] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 164.884069] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 164.892666] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 164.905091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.914983] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 164.925089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.935741] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 164.943091] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 164.954369] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 164.961600] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 164.974098] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 164.981483] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 164.989191] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 164.997678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.005996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.013868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.021239] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.029782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.038419] device veth0_vlan entered promiscuous mode [ 165.050707] device veth1_vlan entered promiscuous mode [ 165.059954] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 165.071911] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 165.085211] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 165.092673] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 165.099513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.109767] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 165.115729] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.124082] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 165.131206] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 165.147456] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 165.156871] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 165.170507] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 165.187543] device veth0_macvtap entered promiscuous mode [ 165.200519] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 165.207827] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 165.216469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 165.224527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.245121] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 165.260934] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 165.270335] device veth1_macvtap entered promiscuous mode [ 165.286264] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 165.303748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 165.311338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.324251] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 165.334132] device veth0_macvtap entered promiscuous mode [ 165.334656] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 165.340530] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 165.353452] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 165.359554] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 165.369678] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 165.390033] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 165.401967] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 165.417065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 165.425031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.434475] device veth0_macvtap entered promiscuous mode [ 165.440733] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 165.451154] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready 15:21:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 165.478697] device veth1_macvtap entered promiscuous mode [ 165.491755] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 165.518073] device veth1_macvtap entered promiscuous mode [ 165.529348] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 165.538949] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.551451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.575055] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.585575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.595315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.605329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.617302] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 165.624712] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 165.633907] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.643746] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.657236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.668660] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.679336] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.689775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.700776] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 165.708537] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 165.719439] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 165.729715] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.737620] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 165.745030] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.752099] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.760094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.768262] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.776759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.796476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 165.814541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 165.869032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 165.878320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.888525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.897860] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.907636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.916818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.927151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.937134] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.946893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.948060] Bluetooth: hci0: command 0x0419 tx timeout [ 165.963614] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 165.970686] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 165.979665] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 165.988651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.999443] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.009693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 166.020209] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.029740] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 166.039890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.049543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 166.059714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.069525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 166.079635] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.089855] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 166.097282] Bluetooth: hci1: command 0x0419 tx timeout [ 166.098987] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 166.110820] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 166.125110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.133331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 166.140995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.150945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 166.161480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.171973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 166.183820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.192975] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 166.202765] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.211855] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 166.221642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.232199] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 166.239230] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 166.256406] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 166.259674] Bluetooth: hci2: command 0x0419 tx timeout [ 166.270951] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 166.280587] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 166.283221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.327521] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 166.338355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.349160] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 166.359179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.368337] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 166.378112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.387434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 166.397178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.406360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 166.417053] Bluetooth: hci3: command 0x0419 tx timeout [ 166.419821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.435059] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 166.441915] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 166.451273] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 166.459039] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 166.467346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.478373] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 166.485981] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 166.510716] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 166.539083] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 166.574108] Bluetooth: hci4: command 0x0419 tx timeout [ 166.654171] Bluetooth: hci5: command 0x0419 tx timeout [ 166.672368] hrtimer: interrupt took 61024 ns [ 166.694099] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 166.714684] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 166.721801] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 166.757733] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 166.779045] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 166.793989] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 166.801102] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 166.826669] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 166.924279] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 166.931435] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 166.952647] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 166.959416] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 167.035083] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 167.065279] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 167.078015] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 167.112458] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 167.124878] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 167.201506] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 167.238087] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 167.241655] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 167.258109] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 167.282488] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 167.289849] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 15:21:26 executing program 4: write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000600), 0xa) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x3) ioctl$sock_bt_hci(r0, 0x5411, &(0x7f0000000080)) [ 167.335221] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 167.370244] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 167.386202] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 167.401560] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 167.410056] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 167.439939] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 167.447433] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 15:21:26 executing program 4: io_setup(0x2003, &(0x7f0000000000)=0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000700)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) [ 167.493809] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 167.512896] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:21:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000019440)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffdf}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10c, &(0x7f0000000180)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 15:21:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = getpid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00') ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000001c0)={"b02ce146b1d06b982180b474165971c5", r2, 0x0, {}, {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c09425, &(0x7f0000000080)={"24f6bf4d8ac4ffe99959035c54578b74", 0x0, r2, {0x1f}, {0x8000, 0x1000}, 0x521000000, [0x0, 0x1, 0x0, 0x80000001, 0x0, 0x7, 0x5, 0x0, 0x9, 0x4, 0x7f, 0x6, 0x40, 0x7, 0x9, 0x2]}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x15) [ 167.645736] new mount options do not match the existing superblock, will be ignored [ 167.682012] delete_channel: no stack [ 167.708402] new mount options do not match the existing superblock, will be ignored [ 167.728770] delete_channel: no stack 15:21:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000da0000000f0000000100000000000000000000000020000000200000200000002ac4645f2ac4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@journal_dev={'journal_dev'}}]}) 15:21:26 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) socket$inet6_sctp(0xa, 0x0, 0x84) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x28004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x10006, 0xf186}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) socket$netlink(0x10, 0x3, 0x0) [ 167.868580] EXT4-fs (loop3): Mount option "journal_dev=0x0000000000000000" incompatible with ext2 [ 167.955214] EXT4-fs (loop3): Mount option "journal_dev=0x0000000000000000" incompatible with ext2 15:21:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) ioctl$SNDCTL_DSP_SPEED(r2, 0xc0045002, &(0x7f0000000080)) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) sendfile(r2, r1, 0x0, 0x1c01) 15:21:28 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000100)=0x10000, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 15:21:28 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CTX(r0, 0x541b, 0x0) 15:21:28 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x6b}}) 15:21:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = getpid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00') ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000001c0)={"b02ce146b1d06b982180b474165971c5", r2, 0x0, {}, {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c09425, &(0x7f0000000080)={"24f6bf4d8ac4ffe99959035c54578b74", 0x0, r2, {0x1f}, {0x8000, 0x1000}, 0x521000000, [0x0, 0x1, 0x0, 0x80000001, 0x0, 0x7, 0x5, 0x0, 0x9, 0x4, 0x7f, 0x6, 0x40, 0x7, 0x9, 0x2]}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x15) [ 169.665504] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 169.688350] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 169.701821] syz-executor.3 (8349) used greatest stack depth: 23248 bytes left 15:21:28 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x51f) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="232115beb066696c653020200a"], 0xe5) close(r0) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 15:21:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x6c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 169.720281] hpfs: Bad magic ... probably not HPFS [ 169.789100] hpfs: Bad magic ... probably not HPFS 15:21:29 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:29 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="9645582c988f84634b28875ff7ce345e6ce94f978a0a08af18cd2588e341a9d53561fc5f8741f42bb99b3f0facf1937c34107cdbb10151ab6f46e1aef54d5fe2080fe625bb98f9a7a8", 0x49}], 0x1}}], 0x2, 0x0) 15:21:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)=@nl=@proc={0x10, 0x0, 0x25dfdbfd}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000680)="1bb016a81d2e4d7f19c9bf0542deed295f7e51924d72f4c0403fdf0bba4a4dbf41fedf78d57fbc8e5ef8690d11f41a7ff9cfe45a72419e15ac2134f9d77f54214fdc628b8ce991419dae30d9dcd5021d556663dc9dc8d6d31d10ff75f6e223e78f6250", 0x63}], 0x1}, 0x8001) getpid() bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0xb, 0x3, &(0x7f0000000f40)=@raw=[@alu={0x4, 0x0, 0xa, 0x3, 0xb, 0x18, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x17}, @ldst={0x2, 0x3, 0x4ec5d839ce9dbf4a, 0xa, 0x9, 0x18, 0x8}], &(0x7f0000000f80)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x5, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001000)={0x2, 0x0, 0x9}, 0x10, 0xffffffffffffffff}, 0x78) [ 169.946034] hpfs: Bad magic ... probably not HPFS 15:21:29 executing program 0: connect$packet(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') sync() setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x9, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'batadv_slave_0\x00'}) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x404000, 0x0) listen(0xffffffffffffffff, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000021c0)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x9, 0x4, 0xad, 0x4}}, 0x20) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x41f4b, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x8, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={r3}, 0xc) [ 170.151802] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 170.933466] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 170.952204] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 170.965566] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 15:21:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x1b, 0x5b, 0x7, 0x7, 0x31, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:21:31 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)=@nl=@proc={0x10, 0x0, 0x25dfdbfd}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000680)="1bb016a81d2e4d7f19c9bf0542deed295f7e51924d72f4c0403fdf0bba4a4dbf41fedf78d57fbc8e5ef8690d11f41a7ff9cfe45a72419e15ac2134f9d77f54214fdc628b8ce991419dae30d9dcd5021d556663dc9dc8d6d31d10ff75f6e223e78f6250", 0x63}], 0x1}, 0x8001) getpid() bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0xb, 0x3, &(0x7f0000000f40)=@raw=[@alu={0x4, 0x0, 0xa, 0x3, 0xb, 0x18, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x17}, @ldst={0x2, 0x3, 0x4ec5d839ce9dbf4a, 0xa, 0x9, 0x18, 0x8}], &(0x7f0000000f80)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x5, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001000)={0x2, 0x0, 0x9}, 0x10, 0xffffffffffffffff}, 0x78) 15:21:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000bc0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000b80)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) 15:21:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x11, 0x8100, r2, 0x1, 0x0, 0x6, @local}, 0x14) 15:21:31 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000500)={0x1, 0x0, [{0x1, 0xd33, 0x7}]}) [ 172.700867] hpfs: Bad magic ... probably not HPFS [ 172.701562] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 15:21:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000bc0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000b80)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) 15:21:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f43ecdb4cb92e0a480e002a000000e8bd6e00b80314000e000100240248ff050005001200", 0x2e}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) 15:21:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x7b, &(0x7f00000001c0)=@assoc_value={r3}, 0x8) 15:21:32 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/vlan/config\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x19c, 0x6c000000, 0x0) [ 172.886194] device batadv_slave_1 entered promiscuous mode [ 172.935463] hpfs: Bad magic ... probably not HPFS 15:21:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clock_gettime(0x3, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3cusgrVex:De', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 15:21:32 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000001400)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d", 0x200) sendfile(r0, r1, 0x0, 0x11f08) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x4008ae6a, 0x0) 15:21:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) sendmmsg$inet6(r0, &(0x7f0000004500)=[{{&(0x7f0000001900)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x6c1}, 0x1c, 0x0}}], 0x2, 0x0) [ 173.106698] audit: type=1800 audit(1603034492.275:9): pid=8588 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=3 res=0 [ 173.188402] audit: type=1804 audit(1603034492.305:10): pid=8588 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir000586342/syzkaller.5DDvPL/5/file1/file0" dev="loop2" ino=3 res=1 15:21:32 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000001c0)={0x2, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 15:21:32 executing program 0: r0 = epoll_create1(0x0) r1 = getpgrp(0xffffffffffffffff) r2 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r0}) 15:21:32 executing program 5: syz_mount_image$hpfs(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:32 executing program 1: ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x0, 0x7}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f38e0f0909013a360f0666b8c0008ec00f551fed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f00000000c0)={0x0, 0x99}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:21:32 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000001400)="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", 0x200) sendfile(r0, r1, 0x0, 0x11f08) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x4008ae6a, 0x0) 15:21:32 executing program 5: syz_mount_image$hpfs(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x14, 0x0, 0x0) 15:21:32 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$getregset(0x4204, r0, 0x0, &(0x7f00000000c0)={0x0}) 15:21:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x60, r1, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x60}}, 0x0) [ 173.434548] audit: type=1800 audit(1603034492.605:11): pid=8619 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=4 res=0 [ 173.498468] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=37 sclass=netlink_tcpdiag_socket pid=8638 comm=syz-executor.1 [ 173.543943] audit: type=1804 audit(1603034492.645:12): pid=8619 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir000586342/syzkaller.5DDvPL/6/file1/file0" dev="loop2" ino=4 res=1 15:21:33 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000500)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000000)={{0x80}, 'port0\x00'}) 15:21:33 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000080), 0x5b) userfaultfd(0x0) 15:21:33 executing program 3: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000700)=ANY=[], 0x5) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x0, 0x0) dup(0xffffffffffffffff) accept4$rose(0xffffffffffffffff, &(0x7f00000000c0)=@short={0xb, @dev, @netrom}, 0x0, 0x800) r2 = fanotify_init(0x200, 0x0) fanotify_mark(r2, 0x1, 0x3e, r1, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 15:21:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000580)={'sit0\x00', 0x0}) 15:21:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000001400)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d", 0x200) sendfile(r0, r1, 0x0, 0x11f08) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x4008ae6a, 0x0) 15:21:33 executing program 5: syz_mount_image$hpfs(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) [ 173.881118] audit: type=1804 audit(1603034493.045:13): pid=8661 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir243449415/syzkaller.iBocqM/8/bus" dev="sda1" ino=15816 res=1 15:21:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xc) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c00000024000b0f000000000000000000020000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100647272"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x4}}]}, 0x34}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x492492492492642, 0x0) 15:21:33 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', 0x0, 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x20000000000000d8) [ 174.019712] audit: type=1804 audit(1603034493.115:14): pid=8672 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir243449415/syzkaller.iBocqM/8/bus" dev="sda1" ino=15816 res=1 [ 174.076371] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 15:21:33 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', 0x0, 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:33 executing program 0: r0 = memfd_create(&(0x7f0000000040)='4\xacXrcO\b\xc4ut/eve\x94\xa1m\x1e\x12\x8ai,\xbeTnt#\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="7f454c46000000d2000000000001000003003e0000001000000006000000001e40000000000000000000000000008b00000000100000380002"], 0x44) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 174.156109] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 15:21:33 executing program 2: ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x2, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x9, 0x0, "39606619"}, 0xd02e, 0x0, @fd}) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000140)=""/106) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x218, 0x0, 0x0) 15:21:33 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', 0x0, 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000480)="4d1dafc4205999ce1e5971d8f686ad01f3b91dde4dead078f76a296fb9a95ec4741e7f8e51f597b34fc964038cc13ac96d1cc4af84f4f114", 0x38}], 0x1}, 0x0) [ 174.254152] audit: type=1800 audit(1603034493.155:15): pid=8675 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=15817 res=0 [ 174.308869] audit: type=1804 audit(1603034493.165:16): pid=8675 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir000586342/syzkaller.5DDvPL/7/file1/file0" dev="sda1" ino=15817 res=1 [ 174.683650] audit: type=1804 audit(1603034493.855:17): pid=8672 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir243449415/syzkaller.iBocqM/8/bus" dev="sda1" ino=15816 res=1 15:21:33 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 15:21:33 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="0300003a0967f207"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2352, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x10040}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='rdma.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) 15:21:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) fsetxattr$security_evm(r2, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000440)=@v2={0x3}, 0x9, 0x0) 15:21:33 executing program 2: syz_mount_image$afs(&(0x7f0000000000)='afs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dyn='dyn'}]}) utime(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) 15:21:33 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0x0, &(0x7f0000013b00)) [ 174.725413] audit: type=1804 audit(1603034493.875:18): pid=8672 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir243449415/syzkaller.iBocqM/8/bus" dev="sda1" ino=15816 res=1 15:21:34 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r2}, @IFLA_IPTUN_FWMARK={0x8}]}}}]}, 0x44}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924b68, 0x0) 15:21:34 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) [ 174.807682] EXT4-fs (loop1): unsupported descriptor size 0 15:21:34 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 174.936488] EXT4-fs (loop1): unsupported descriptor size 0 15:21:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x2, 0x400, 0x8}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r0}, 0x38) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/168, &(0x7f0000000080), &(0x7f0000000080), 0x3, r0}, 0x38) 15:21:34 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{'check=strict'}]}) 15:21:34 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r0, &(0x7f00000005c0)={0x1e6, 0x7d, 0x0, {{0x500, 0x221, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2b, 'nodev{\xff\x1b\x00\x82\x02\x00@\x00\x00\x00\x00\x1a\x00\xc6Lhg~\xa6\xe7\x95\xce\r1\x13%\x8dYc\xfb\x80\a\xd1\x12\x00\x85\xd3', 0x34, 'p\x02\x00}\xfag>\xff\xeb\t\xb55\x1f[\xde1@\x00\x00\x00\x00\x18{\x82\xd9\xb5\x00\x00+Y_\xcb\x14\x04\x00T\xb9\xfd\x9e\xf1\x96\xa5\x1c\xd5\x15z\xdc\x81\x06\xb4\x94\xe1', 0xf6, 'cgro\x98ppppP\x97\xed\x00\x11\x82\x9fs\x9a\xf1\x019}_D$\xc9\x88\xa3\x16`\xee\xd6\xc3^\b\xb2\x9a\x12a\aB\xb6\x1aA0\xcf%\x91\x9f\xcb\x04\xeb\x94p\xa9\xa0\xbc\x16\x97\xb1\xb4\x9b\x1e_G\xf8\xb9\xbc\x844\x80\xbb\x1e\x98\xde\xc2\xd4vd}\xae\x7f\xef\xa9\x16\xed\x06\x9a\xdb\xe5\xa7G]\x05\xf6\x8a\xeb*\xcb\xc3\xe2\x9f\x9b\xed2\xb8~\xd4\xea\xdb\xac)\xce\x16u\x03\x8eh\x90[\xf3\x9bO\'\x00\"\x82\x1e7\r\xe7\x87J\xc0\xb6\x00\x00\x00\x00\xf8\a6\x91\x04\xb4JD\xcb\xca\x7f\xeb|\xcc\xb8H\xee\xab\xe86D\xd9\x9a\b\r\xbe\xc3TO27`\xc1\xabR\x17\xa3C2\xb5K0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:21:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1) 15:21:34 executing program 0: pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$netlink(r4, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000000000000001f92e0000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5], 0x54}, 0x0) recvmmsg(r2, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x2, 0x62, 0x0) 15:21:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000200)={0x7b}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:21:34 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, 0x0) 15:21:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x209e20, 0x2, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x249000) 15:21:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000001200)=ANY=[], 0x10132) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)='h', 0x1}], 0x1) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000100)=0xffff, 0x4) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/220, 0xdc}}], 0x1, 0x0, 0x0) 15:21:34 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 175.629181] kvm [8798]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000040 15:21:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010003000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000880)="0000000000000000000000003bf48e55190e4cca80d5ddff88e78b3dd460810421", 0x21, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) 15:21:34 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, 0x0) [ 175.715724] kvm [8798]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000000d 15:21:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) 15:21:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000010c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x53, 0x5, 0x0, 0x4, 0x8, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={0x0}, 0x0, 0x3, 0x39d0, 0x9, 0x0, 0x1, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x35, 0x4, 0x4, 0x0, 0x0, 0x100000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7}, 0xc0, 0x0, 0x1, 0x8, 0x5a524aeb, 0x7ff, 0x7ff}, 0xffffffffffffffff, 0x0, r1, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0xa, 0x1005, 0x8}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r2, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000001100)=""/74) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r2, &(0x7f0000000240)="777351b50f0ad1371ab318c3728985c95abaced812f9c4dff412992da155b381f2c2a7c9bbf222b664a97ceec07ad36130865433c297", 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000012c0)={@map=r4, 0xffffffffffffffff, 0xb, 0x6}, 0x14) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086607, 0x40000d) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) [ 175.781530] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 175.843644] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c018, mo2=0002] [ 175.870533] System zones: 1-20 15:21:35 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)) 15:21:35 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 175.897315] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 15:21:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'syz_tun\x00'}}]}, 0x38}}, 0x0) [ 176.025158] EXT4-fs warning (device sda1): ext4_group_extend:1829: will only finish group (524288 blocks, 256 new) 15:21:35 executing program 0: r0 = epoll_create(0x2) fallocate(r0, 0xc, 0x0, 0x8) 15:21:35 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 176.079199] EXT4-fs warning (device sda1): ext4_group_extend:1835: can't read last block, resize aborted [ 176.110675] hpfs: Bad magic ... probably not HPFS 15:21:35 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000000c0)={{0x0, 0x5}}) 15:21:35 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)) 15:21:35 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/sequencer\x00', 0x18d001, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @dev, 0x1ffffff}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8936, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x200000000000000, 0x30c, 0x0, 0x8, 0xe003, 0x33c, 0x0, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r2}) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@empty, @empty, @empty, 0x3, 0x0, 0x22, 0x0, 0x100000000, 0x0, r2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f270008c0cc545640afff9af97288ee0bb983881a4d5271b477752b236ac8a5cff722439035fba513d97cc2d108ef436f4266a5b2cf86a162af49"], &(0x7f0000000880)=0x1) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={@ipv4={[], [], @multicast1}, @remote, @mcast2, 0x0, 0x0, 0x0, 0x400, 0x4, 0x80200260, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r4, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) [ 176.210727] EXT4-fs warning (device sda1): ext4_group_extend:1829: will only finish group (524288 blocks, 256 new) 15:21:35 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:35 executing program 1: getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000880)=ANY=[], 0x5) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(0xffffffffffffffff) r3 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000004c0)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000100)=0x90) 15:21:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@bridge_delneigh={0x28, 0x1c, 0x50f, 0x0, 0x0, {0x7, 0x0, 0x0, r4, 0x3, 0x36}, [@NDA_LLADDR={0xa, 0x2, @multicast}]}, 0x28}}, 0x0) [ 176.275044] EXT4-fs warning (device sda1): ext4_group_extend:1835: can't read last block, resize aborted [ 176.292784] hpfs: Bad magic ... probably not HPFS 15:21:35 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x4001, 0x3, 0x4d8, 0x0, 0x0, 0x148, 0x360, 0x148, 0x440, 0x240, 0x240, 0x440, 0x240, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x35, 0x0, 0x0, 0x0, 0x0, 0x40000ec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @bytecode={0x2, 0x0, 0x94}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xc0, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 15:21:35 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:35 executing program 5: syz_mount_image$hpfs(&(0x7f0000000700)='hpfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000b80)) 15:21:35 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/sequencer\x00', 0x18d001, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @dev, 0x1ffffff}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8936, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x200000000000000, 0x30c, 0x0, 0x8, 0xe003, 0x33c, 0x0, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r2}) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@empty, @empty, @empty, 0x3, 0x0, 0x22, 0x0, 0x100000000, 0x0, r2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f270008c0cc545640afff9af97288ee0bb983881a4d5271b477752b236ac8a5cff722439035fba513d97cc2d108ef436f4266a5b2cf86a162af49"], &(0x7f0000000880)=0x1) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={@ipv4={[], [], @multicast1}, @remote, @mcast2, 0x0, 0x0, 0x0, 0x400, 0x4, 0x80200260, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r4, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) 15:21:35 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000300)={{0x77359400}, {0x0, 0x989680}}, 0x0) timerfd_gettime(r0, &(0x7f0000000000)) [ 176.466706] xt_hashlimit: overflow, rate too high: 0 [ 176.474062] bridge_slave_1: FDB only supports static addresses [ 176.490231] hpfs: Bad magic ... probably not HPFS [ 176.526451] bridge_slave_1: FDB only supports static addresses 15:21:35 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) write$cgroup_int(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a03, 0x1707) close(r1) socket$nl_route(0x10, 0x3, 0x0) 15:21:35 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = memfd_create(&(0x7f0000000280)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000140), 0xfa3) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 15:21:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x35}, [@call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd0c}, 0x64) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) 15:21:35 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:21:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)={0x14, r1, 0x109b358f86c03d5b, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 15:21:36 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="24b68dc4fcceef1b5d50"], 0x1a) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps_rollup\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) 15:21:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x75c4f2668ab45b70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff50, &(0x7f0000000180)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002a000000e8bd6e00b80314000e000100240248ff050005001200", 0x44}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) 15:21:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) write$cgroup_int(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a03, 0x1707) close(r1) socket$nl_route(0x10, 0x3, 0x0) 15:21:36 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 177.289493] batman_adv: The newly added mac address (24:02:48:ff:05:00) already exists on: batadv_slave_1 [ 177.341267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:21:36 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000140), 0x4) [ 177.459553] device batadv_slave_1 entered promiscuous mode 15:21:36 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x430a1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0xb}, 0x48403, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xd, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0406619, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) openat$cgroup(r2, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x40047451, 0x790006) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0406619, 0x0) 15:21:36 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:36 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000003000000000000000800090003000000", 0x24) [ 177.538227] batman_adv: The newly added mac address (24:02:48:ff:05:00) already exists on: batadv_slave_1 15:21:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000280)={0x0, 0x40, 0x0, 0x0, "013dc75cf28de10438f8b2af88335fdf9ce8e1136822a62fd44db3d571abc7e5"}) [ 177.538237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:21:36 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:36 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00', 0x3c}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x15) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:21:37 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000003000000000000000800090003000000", 0x24) [ 177.838772] input: syz1 as /devices/virtual/input/input5 15:21:37 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) 15:21:37 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:37 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000180)=0xf27) 15:21:37 executing program 0: r0 = socket(0x22, 0x2, 0x1) sendmsg$NL80211_CMD_SET_PMK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:21:37 executing program 4: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000003000000000000000800090003000000", 0x24) 15:21:37 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:37 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f00000002c0)={0x2, 0x1}, 0x10) 15:21:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x2, 0x0, 0x0) 15:21:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_PRIMARY_RESELECT={0x5}]}}}]}, 0x3c}}, 0x0) 15:21:37 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000001c0)=""/171, 0xab}, {&(0x7f0000000280)=""/98, 0x62}], 0x2}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b000007"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000581, 0x0) recvmmsg(r0, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400}) 15:21:37 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x4}]}}, &(0x7f0000004600)=""/200, 0x26, 0xc8, 0x8}, 0x20) 15:21:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:37 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="340000001300290a000000000000000007000000", @ANYRES32=r4, @ANYBLOB="000000000000000014001a80100004800c000680"], 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x0) 15:21:37 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r3, 0x0, 0x4, 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000, 0x0) creat(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) 15:21:37 executing program 3: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000000)={0x6, 0x7, 'syz1\x00'}, &(0x7f0000000240)=0x28) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000080)=0x68) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000640)='\f', 0x1, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0)='ethtool\x00') r3 = dup(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fedbdf", @ANYRES32=0x0, @ANYBLOB="0c32f600070000002107000008001f01000200000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x44055) socket$packet(0x11, 0x0, 0x300) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000200)) ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x400) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={r4, @loopback, @private}, 0xc) ioctl$TIOCL_SETSEL(r0, 0x4b6a, &(0x7f00000000c0)) 15:21:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'vlan0\x00', &(0x7f0000000240)=@ethtool_drvinfo={0x3, "b2b33735976ae695244f629f8de22abc8ed54c4551229461232b029075e6e2c3", "08fe1e58b584829921eb906e15cfd42e5525f63d15a5a544ffc98d4b73c97e59", "3517994f0a255df592dcc3024b98850edd5e06a801851da4fadb87b2bfa18c5b", "24259cffaa2b7966261d97d1e1a3041b38d26a112f05658a3cb6a33c23f36e74", "93d0e63924a200a350aa10f1151934f66244ab4a241d0e5f6d7cdea9cccf0580", "74556ef1f2353af70c64f247", 0x0, 0x0, 0x0, 0x7a, 0x2}}) 15:21:37 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 15:21:37 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000080)=[{&(0x7f00000001c0)}, {&(0x7f0000002140)="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", 0x16f}], 0x2, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @dev}}}, @ip_tos_u8={{0x11}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe5, [@dev, @rand_addr, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @local]}]}}}], 0x68}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 178.511915] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 15:21:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 178.554615] UDF-fs: Scanning with blocksize 512 failed 15:21:37 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 15:21:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff84}}, &(0x7f0000000180)='GPL\x00'}, 0x48) [ 178.631497] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 15:21:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000080)=[{&(0x7f00000001c0)}, {&(0x7f0000002140)="b51b43b6fbf977f93646317cea4b944020faec2e6692eacb76a18fc37203c0da5e950060718dcb8d4b21dc17d3d305e495519568cf44a62322db125d64bfa97175e175bb5e78e448890d2911e4655730336e0f27ab34745cb80096969745dac984dc7a214ff6fba48917e5128651e496ef62ed70a03dfd47457449265610602f6cdc672ac24d30deb294433ce2bd6d0bf5be2a3a4e02939c0953ed7e8b350ea364c2d9f865556955cb7a38e792f81dee858cef6da05c6e37adfe80f784465e03e3bd869f31ebff15d81b0121f826e4fd34be631275ebe849f4519cf6da30de99c0e1f929fc5a02563ec1ddc35c1416b3b5ef4389659d88dac11a67bef5a37deadb660a665c35ebb7eb223edbb92666d7a7fa7f271536da3606a3b583cb95f8715883c59dfd2da44dd101ee8d8f1cac32fae90f87393a8d4d749efc2186201233079a6182631838d95e4aa47ce52bdeac45e348bf14f2cf06e17223a4e677a9564fcb244284196b171aee3ff45ec35e", 0x16f}], 0x2, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @dev}}}, @ip_tos_u8={{0x11}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe5, [@dev, @rand_addr, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @local]}]}}}], 0x68}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 178.696147] UDF-fs: Scanning with blocksize 1024 failed 15:21:37 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 178.776015] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 178.838522] UDF-fs: Scanning with blocksize 2048 failed [ 178.914820] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 178.990891] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 179.030955] UDF-fs: Scanning with blocksize 4096 failed [ 179.058825] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 179.137460] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 179.144657] UDF-fs: Scanning with blocksize 512 failed [ 179.156290] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 179.164035] UDF-fs: Scanning with blocksize 1024 failed [ 179.172288] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 179.179399] UDF-fs: Scanning with blocksize 2048 failed [ 179.186289] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 179.196006] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 179.205312] UDF-fs: Scanning with blocksize 4096 failed [ 179.210777] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 15:21:38 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00') sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x30, r1, 0x5, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x30}}, 0x0) socket(0x0, 0x0, 0x0) 15:21:38 executing program 0: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)={0x4c, 0x2, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x4c}}, 0x0) 15:21:38 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x29, 0x4, 0x0, 0x0) 15:21:38 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000080)=[{&(0x7f00000001c0)}, {&(0x7f0000002140)="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", 0x16f}], 0x2, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @dev}}}, @ip_tos_u8={{0x11}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe5, [@dev, @rand_addr, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @local]}]}}}], 0x68}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:21:38 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:38 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x11b, &(0x7f0000000400)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x3d) [ 179.323976] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 179.343836] mmap: syz-executor.0 (9116) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 179.352868] UDF-fs: Scanning with blocksize 512 failed 15:21:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 15:21:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00') [ 179.413138] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 179.444601] UDF-fs: Scanning with blocksize 1024 failed 15:21:38 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x86, &(0x7f0000002300)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dc4a7410b363de4fb357baa16dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 15:21:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000780)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x24}}, 0x0) [ 179.470364] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 179.499913] UDF-fs: Scanning with blocksize 2048 failed 15:21:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x25) [ 179.560433] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 179.592003] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 15:21:38 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:38 executing program 3: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x2000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="726177b9f70000000000000000000000000000000000000000000000000000000200000003000000880400000000000098000000000000009800000500000000f0030000f0030000f0030000f0030000f00300000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000010000070000000000ac1414aa00000000000000000000000076657468315f746f5f626f6e6400000065716c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001003580300000000000000000000000000000000000000005001686173686c696d697400000000000000000000000000000000000000000269705f7674693000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000fcffffff0e0000600000000000000000000000005001686173686c696d697400000001000000000000000000000000000000000276657468305f746f5f7b737200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000006e00000000000000000000000900000008000000000000000000000000000000480054454500000000000000000000ba60eabc545ffd22000000000000000001ac1414bb0000000000000000000000007465716c3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x2000000000000, 0x40, &(0x7f0000000000)=ANY=[], 0x0) syz_open_dev$audion(&(0x7f0000000500)='/dev/audio#\x00', 0x9, 0x0) [ 179.611395] warning: process `syz-executor.0' used the obsolete bdflush system call [ 179.616749] UDF-fs: Scanning with blocksize 4096 failed [ 179.639939] Fix your initscripts? [ 179.649252] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 15:21:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 15:21:38 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:38 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273eea3e0", 0x48, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:38 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x1cb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet(r0, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)}}], 0x2, 0x4000000) 15:21:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002e000511d25a80648c63940d1535fc60100012400c0002000200000037153e370a00018004000000d1bd", 0x2e}], 0x1}, 0x0) 15:21:39 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x400000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000001400)="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"/3584, 0xe00) fallocate(r1, 0x11, 0x0, 0x10000) sendfile(r1, r2, 0x0, 0x11f08) 15:21:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)={0x54, r1, 0x1, 0x0, 0x0, {0x13}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x54}}, 0x0) 15:21:39 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 179.876883] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 179.897870] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 179.910563] UDF-fs: Scanning with blocksize 512 failed [ 179.919374] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 179.955258] UDF-fs: Scanning with blocksize 1024 failed [ 179.963359] kauditd_printk_skb: 6 callbacks suppressed [ 179.963370] audit: type=1800 audit(1603034499.125:25): pid=9182 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15852 res=0 15:21:39 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273eea3e0", 0x48, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:39 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 180.030857] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 180.063577] UDF-fs: Scanning with blocksize 2048 failed 15:21:39 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40286608, &(0x7f0000000000)=0xfffffffffffffffd) close(r2) 15:21:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x40000d) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) [ 180.084838] audit: type=1804 audit(1603034499.145:26): pid=9182 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir519463753/syzkaller.UGS7gy/26/file0" dev="sda1" ino=15852 res=1 [ 180.143434] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 180.166123] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 180.184321] UDF-fs: Scanning with blocksize 4096 failed [ 180.203175] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 15:21:39 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:39 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:39 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273eea3e0", 0x48, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x800, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="eb3d90", 0x3}, {&(0x7f0000000080)="02", 0x1, 0x10}], 0x0, &(0x7f0000000340)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 15:21:39 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273eea3e0", 0x48, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 180.509203] FAT-fs (loop5): bogus number of reserved sectors [ 180.548891] FAT-fs (loop5): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 180.589451] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 180.593524] FAT-fs (loop5): Can't find a valid FAT filesystem 15:21:39 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000040)=""/71, 0x47) [ 180.642218] UDF-fs: Scanning with blocksize 512 failed [ 180.651270] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 180.667321] UDF-fs: Scanning with blocksize 1024 failed [ 180.678727] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 15:21:39 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000100)={'macvtap0\x00', @ifru_data=0x0}) 15:21:39 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:39 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 180.691211] UDF-fs: Scanning with blocksize 2048 failed [ 180.698832] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 180.717188] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 180.742433] SQUASHFS error: zlib decompression failed, data probably corrupt [ 180.755204] FAT-fs (loop5): bogus number of reserved sectors [ 180.776321] FAT-fs (loop5): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero 15:21:39 executing program 0: syz_mount_image$v7(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273eea3e0", 0x48, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 180.792367] UDF-fs: Scanning with blocksize 4096 failed [ 180.799045] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 180.808123] SQUASHFS error: squashfs_read_data failed to read block 0x115 [ 180.816324] SQUASHFS error: Unable to read metadata cache entry [115] [ 180.830830] SQUASHFS error: Unable to read directory block [115:26] 15:21:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000780)={0x3, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 15:21:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 180.840040] FAT-fs (loop5): Can't find a valid FAT filesystem 15:21:40 executing program 4: syz_mount_image$udf(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000100)={0x11c, 0x52, 0x4a5, 0x0, 0x0, "", [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x8, 0x1, 0x0, 0x0, @u32=0xe}, @generic="31d7cc47201185b0943df8430842ad5942559582eb4817ade9a73b8be2bc837118e2f9abc85f8c82c669a66838c3db2ac1e7fa95e41249162e056f470041da8ae1251047b5c73655340b78fd206502d41bcd956e1a7cf7146834977b042ed1777bdf608f287ed2f4e5dd5d144c194831f53b5352ab8cf294550ab2094ea6002edc433ff75fb9a61e9a0cbdbe2efb6bf2840764ee68c23951a34c6901a595ab7de1f7fc1e73ca4aa68b7f0fcae3de456aaef2d99f36e1643b4acc759fbea730d0e78bd812aeac9eece1ebe1fa1cfcec81c8ad3f145ba4dd2f77bf87a361ba7c9e4227f51de84002c3b525c6b186147207501f337cac93"]}]}, 0x11c}], 0x1}, 0x0) 15:21:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:40 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80086603, &(0x7f00000005c0)) 15:21:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x21, 0x0, &(0x7f0000000040)) 15:21:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x0, "ac8d373c67b405afabe4e34677618c9b61702ff6c9299f9d088950029b84758e", 0x10, 0x0, 0x0, 0x0, 0x2}) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x7ff, 0x0) socket$inet(0xa, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) accept4(0xffffffffffffffff, 0x0, 0x0, 0xc00) [ 180.985843] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.1'. 15:21:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:40 executing program 4: syz_mount_image$udf(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:40 executing program 0: syz_mount_image$v7(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273eea3e0", 0x48, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:40 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe2c5e16d87cebd96a909d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000280)='G', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000440)=""/243, 0x3a9, &(0x7f0000000240)={&(0x7f0000000040)={'streebog256\x00\x00\x00\x00\x00\x03\x00'}}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) 15:21:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x801a}}], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 15:21:40 executing program 0: syz_mount_image$v7(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273eea3e0", 0x48, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 181.357088] could not allocate digest TFM handle streebog256 15:21:40 executing program 4: syz_mount_image$udf(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) [ 181.432224] could not allocate digest TFM handle streebog256 15:21:40 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe2c5e16d87cebd96a909d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000280)='G', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000440)=""/243, 0x3a9, &(0x7f0000000240)={&(0x7f0000000040)={'streebog256\x00\x00\x00\x00\x00\x03\x00'}}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) 15:21:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = syz_genetlink_get_family_id$nl80211(0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080), 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='htcp\x00', 0x5) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x1ff, 0x37}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x100, 0x0, 0x25dfdbfb, {}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12}]}, 0x28}, 0x1, 0x0, 0x0, 0x50}, 0x40) 15:21:40 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, &(0x7f0000002bc0)="ac6b2252caea8bd7b30ce2d9426f185123d41cf09cbfd5ec86c2667c2cb7b16bd38a7ca66ccad44ece13f755fe3e141663f642a0496f0a55d02c08e2a901e36c4337aff714e639d15fa6da41dd67efb58ca2478207e146c9fe48dd21adf6b2fdfc0b4d1cc20db67a87f9621731d42ec132a545f90fbd62fb7823b77546529dfa117567c8b320cc8e1d7e56c7c0591c50037e2d0bc148eabc800cae8c8a3490867c47eadfa4fe88caab011e44bcd68dfd4df543391c7215a2e8e14a2927c194f9a3a164320148ab3e91479af103407f0a488c20742777f281ca38c46a7560d8932414e703ef4f1f1e2d76341d29feea9521e6a8bfab25bfd690a822584fe2183633d8a528649a61f411bd3d0c84a7891a9cc4bfe950ba66f5ca75019fde63147cb1da077ee1c1064394c5395525884be9e8c45362d58056250aea170db928cdcb3cf325a34930d732abaea5997bd9221c407d1243f1396feb1337b747a4e148e7626582de28822852d44ed454a2f0a74907d59c4800e6d8e02102f4bcd43e8e02cd2d3330840ce049f288f05b9b32ed2b9f280311d4343e2ff363877b198a2ab153059b5582b27393c4b99b9850436e1f2748f28cb1b4275816a833002dffdbdac50aa2d3adf42bcce77a27dc01b22a4c2b7e2a286a835aafbc8f0dc6caaf56a6e5d52e90430c405cdf3c9e6c7ec5b2596e9a6f2db22f85b74a257dab3725460688bd6e28c386005494ebf4ace72bb9ca228ce34e736c17d7caefc52511c28b8275ece0207597fd1d218622fe2fcaa108d0f0029458e6768cc13a27126f6eac8c516cb9f80c68e735f32aa875c9d7d0d8082f7826c27f8296310b63817bfd60ce8763cfdc2d7c1123f7f510f9b6bc326cbb7f561e9efd6fae143aca000c535c7ad4847c0913d434a7f41858f2fae854f2f910cd7d9f8f61b075fa6a9a5c7f9e30634e2018f80e069dd5cda464e2093fb7549a87a236c97b71dba2db488e03406b2a7464b599672eae5279bf64d45cc10e7f0a04b19110f0a4f09eef6e2f9ead3cc19247de483711782e1257cd1fe7005a2413e0efd92ec9c1698dc928a00f4b2ea05879142b3af901b9696a3981c52294fbcbf68a9ad928e936df151c6e7b255d6c86bee4961eaba99e56c6ffa239c52e9f991f64e1c96590cdd40f966107a26719c856e5f1985e075dc61db7f4f1e47705a302f55750105903ce73fa2c651dcc3f78de1583f857e20e03b1ae58dcc0237493546f18e7290418fc93464c20969472dc98f894ef5cca39e346c3fd38e0a54103744e90ef88573d453f27e651896afa3e910c26111bc7b491e51eb317ae76c10d5f1a94e6737e9bdfae7591115167f919d48c1449452bf0a21cd778af255e1b50c0aff77e39364d4840c7bd649c724750b1463594a3635f8e3bb33b89bd7259e22ce1f98ba01cca4c64c4a41b13876704dbb58d70574a99535fc06863a24dc18e7a0426196c0f2e727693e52bc8539310d9ed6a97395da0e79e9e9fa47fc6a60f635ebc16ce98c851db97ae2968f1ba67382c2aac79bb37b3a93e27a414d8c4f804f4526f5d1061cb608ce5a621692f50c97fa08f7557608c8ce222f0eb1e21d363d2c26a2411ad309094fccb49d8fa3e831a9429aab4878de97367b29363bbf6c3b9fed30ad44958561e5631023d9b61ff5e35e48fb2f91ff3ba71a0ed693a81efe9eca0bcc15d457596300df319c29c0fe3d44d22427e52bf8e628af10fe486cb067897ac2172f617ad940d308b8bb003d296b121ccbcd1d039d1193e6809392f7cf755589f0931da191f22cedd977b560a3f4d2e9a85dc9c2919243cd2801a707a9701edede7639e2c1dbf9c30564db51dad7a59e6db487e92f702e68999523ff4fa6b1ff2a34f31b46f6b96ae53ccebb57bd489e42375f7617969fb7a90fa4a9379155cc68a2d00d2dd992d86cd1df27fa83f0124daa111e11a9ae9b933b9225598eb5c57836dbdca140758b278ef30e6496e19b64e7992e9f4811aa264e3f9ba778997234a7bfe29d25c0879545355cb16c4f0c2c83b3ccd24fa34f895eb715961045789de5f3dbff9ea7e03ec32d8d1f7ef516b193a06990ac3626231aac514fbd1e0698f9fe854003e23eaa4d4e2953f5cde6f1faad6bcee98817e1b7b395a0fdbf149b30e5b3a330fab488f1b55f730893a775320df51da2d82e8727defd5a51ffba32c962e042333f9c9e7c9609b6b3a1ec4669788fd486e7f4c27d587ec6af5bb20a340e5f0da47b32dbe2df5a25389a6d32d2d0da30d529777a8de6d087fc7394e883e887ec87e45b1080052952ccd751c2fedcf4d936b1432ade78902ad1bb69409056964752a73d624cbf37ff5808afaf727ec8470236bb66e8fbdc8ae9a4ab06578e184b75bb946cd105cb4f12a32d54bef90d7edcb60fdcbc3b1652ce2257da86f5ca6fd74c3b4982561c8baee903aaccf4b5ce1cc4e51c55657e97e2780e667e483de9448467cf65b557a9b89ba54d051577c0793a1dee0678de0694a3027c775c92ceef1d61cdf1bd96e3e9e8deb69a6c8ccdb2179e5c97e044198ed4a98bdc9b70f5ece4644858261c422c86179f5ec24918e1443dd4fb2cfd832175c90ba7d441c0a78f90bfd2ba71d9d8cc278f2747ab60a16b0bd66eeaaedf7ac28b00408462cc6db2f2ff3fee8ad56ad62be2b2568a2a30551c6cb787bea961aba5c7fce1aed0c309c6b806204367c070192dd889860665bb40c2863bfedeb15732e4929db5cef07d2be825a44389c387f6d265dd95beeb2d5494018a4d6ca4df1bc034bc16d711a512d1abe4359a42e06001eb9507641e72ef76ebb7afab3164614a769995f64397fc740f53ca05898dece60f9ce775faeebab60ef15cd0332ad05d0cf7a2ad8100cf6323533a4a45a0cf9620443ee2722e96b0851753b7296286c4aa766c1b759246518a250fc31ea5863d2c362c1d3c03077ef4a965d950231f119de4024cfb2fee7b232480f3410877b3b913a33b48bf715863686b7f98fd675864dafaec6b55f3fd8bce6db7632247cd0e359215948c4a2ace2d38ecc52518e5459298bd69ccf388f2c14e624b4df21f307cb625b8c7dc340074e6f2c3828a5d2c27972a81a88723a1e05127792e8a05b56cce9ae877f7a9cef63c400d58707abafdca1da3364de4a93add1a33f6920aad29955d9854dff14a3c0f0745bc21005881ec5a1b5be52c2613b707a3e103d3c94ee0a82cff0ee56fdbeea3ba2494446417e85d319f4b9bbbda406f83608f8f560a668f5390dd8bae39b6086cad8b468beab4062ead78290691a2f2903d0d53b9503488e05aaeabb6f8ccf23b1d0c04856a1f60a193d27d244c532e650560142705b47b77191df4f3f13b25a65384ff005be28248aa8d73060000056867a3f1c4f1a8acf3f9a29beddfd7ec8c1cbe14587f2b8ef9f8d49240da6f5562ecc477a79eab8a0197a1eeb5f0447fd80459a9f3824d6db55977aefe825ecfceeb01a194d78838958d7ef60e40bfdbfa042eca9a28393c5deb67278859cba726393b22d14517fa72bfa3056c57d44eb5e9ce9eec5c0a68575f0cd6219da3df776ed9f989ee9852055c1e7b5824f2685ed6c5a6618f0dd12558e72499a365b23ba0f6fa1209d6c38a96335d160936e54e9f20b43b6ce178347662897fd3d408e8dcaf76eb935ec2890e2453d0b63ce466f18773fd5f467820ecdeadff810e468028030ba16ce00a4f6c59d17e812c965935626d1bd9a3357c467c31582e3b80c665f9b533df3e54b0df6b028a59b185b7ff3c5e68211d1e3f4a4b3cb0ed92f6821249ea4a849c57920177d94bb6b3cf8881fe525bb9dba6a9f002c51346f395885fb812bd96bd862d26a1db1759f1e7cd2643767c9fb3e39e997b0ab47bf8230e31c13cf02c3dddb8a8062554c1369cee9c90cc3f1e80c569f281b76648a5c6baca1f9ca7f8ff0ba271c32023931d5b08806751f1cc0611211919fa9c8fc05bb94c6b86d8ec7b133019e6591cf2b62ad5e3730aac2bb1f7dc1789f9c87adc87f3137aebe0a9ddedd0ca79dd0467bcc57eeb19b509dd07f8c7fd7a1e6e2a4a7787bde0c57ad540b2de0773772fd23e89ee24c87b146c772389ba11a99af805bbbef0aff6d8c4b877725906c659d21a6b1e36a82e41bc85aff7456d02390871a43d5c51b2b542f5aeacb9fd78ede602258defde139e26df4459e54dfb648eac15aed518c4f8a61568003552cfb7e4f6b64e6c99e90d4eb87e90290630aaa9a7e563af6a4f61281868153cb7dd412558da9c58843fbc4629bc2bab27d69d4a570fc426a97d80b6c61f70f4041969550e960b2a9223e651fc815900371ca7d2919fa9d85f5263a360dda969ae9779829e010b85466fb59376935c6c67d1b0348b1ff67d09ac45defcf71fc68a499ccde7346c31c964aa7f8629e83911d8e9da895a695e52888f0366e6812a02d63cd9827f69f01cb78b1146cfc0bf2ccc6e546be1ff906069621e8e70fa4d44a7dcf81e0ee2a43f4f278d002558fa8d7d38d341ee4f171f74cdb89818feb9ce6b268cd937e111b3533a393044f514daea478be58323d47ff61699c83c246434aa4545fd2d42352e5e2765b1ff0b45b1a94bf94d24f1cf330fe2b281f7ace4e9e5abbd340196e957598bbf904975336c055d8de6467d82eaa6899680ae48733d394e66860dc383af2b6bd3027ffb17adf41c2e68459990a2f1ec090f834eef3d6dce82e9eb91819585a5da1ff0918cf83802743709f93e937830e29392c12a251fe7e5995c56973948cad69466f9918de082328491fe7bce716da98b38abab69457bf73591ead0b05444851497ff9b149f55fd253bbbd576f593f62486d9b70839cf148f41c5629b0c9524165a8874470d12b98001226d801fe8f57ad0efd2d791d4f598c0d968cc2951c5b1601678d82c95710460f5c1d72e388afc0e5c789bfabc7615c3b7ec4f84628dbd41f6360ddfa25af1bc1de22c0712efdd3448121c0b7b56645b5ba9ed84bc6852893d19f712ee1d51615df8ac0c9c716e4cf372ac49e82a9364264b9678cd58eaea93867ea1b7ea8c24e2dc58a7c1813b12b55de765d912e4a6b22389a040a477afbc451fd80766685d8afbd106bdbe42352d496a396d6b5ec3628d6e4fbe5a9ebf4df8f0b25a3ef55d72f004c9ff80f6056afdaae73590d89fbc90afb4c35a2ad448d2c801180d96df7a3a331407a562cdf1ae329e11f40e30b102453c990a9980e34188b87e4a3475bedf1ee0db921b262112bde3db09fdec42ebd22a9f7f2f5319f1abb17c6e40021f2be15b2cc8bc328a195f150617e07e510279623f7f4abcbd7944fa4f285805541855b1a2e0feb79f3aeddac7b069e4505d2143941305262ed58f54eebd44a3626b1ebb4d54815132fb851d9fc7453273014be645ccc66351ce5cf3d5ddadc7489641bd1285850f4ec820c3e7b517ce5a113a800d7370466866f7235f2637e675e5336c62c29c2494963abb853b77ff36d2455cc65e07c778995b92a743a1dc564d23e7e63ef8e7328b324f18e04cb8e1222b70ad0200e12d08f1c715add672306f928bbdd2ed69b37640868401f938511fbfd8ee2795f44ae9e6350248fe076f447a762f2cad6aab085160ae07968b1cf827d9c7700914b7bf0340266f9bec68016d3fd41aa7cb0e734727b8a2003ad2cf8035e04160bbddaea8b5123b43ac43d7f81d6863f62463b5b3041ece6a2d77ff14fad5b94b873bd648009457c18c51d07d1a390ef3e508f667644a777e1e0c3e847080fec497da1b281a8"}) 15:21:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:40 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273eea3e0", 0x48, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:40 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) [ 181.710707] could not allocate digest TFM handle streebog256 15:21:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000080)={{0x14}, [], {0x14, 0x11, 0x2}}, 0x28}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) r3 = memfd_create(&(0x7f00000000c0)=')\xb2\xb6W|\x99\xe1\xff\'\xa7I\x8a\x1c\x06p\xbb\x9d\x0e\x97\xcb\x06\x8b\xc6\f\x15P\x80\xe0\xd9\x93\xa2\xef\xf0\x88\x1bwH\xd2>#-\x0ePU\xba\x19G\x97\xd9\xa8\x9b\xcbc\xdb\\\xefTW\xed\xa7\x0f\x19\xc3\x8d\x16\xfa\x11w\xf8wV\xa4@\xaf6!-\x9dMN*\x90\x18H\xee\xbc-\xa8/\xd7%\xd7qA\f\xf0\xd0\xa9\xf9\xd4\xa4\xd2\xca\xde\a\x87\x1e\x16\x91\xd4\xb93L\xad\xbb\xc9\x9f\x9f\xc4\xdc\"*:~\b/\xcbl', 0x0) write$binfmt_aout(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="2108061d0103"], 0x6) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x12) sendfile(r2, r3, &(0x7f0000000000), 0x7fffffffffffffff) 15:21:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x84, @remote, 0x0, 0x1, 'dh\x00'}, 0x2c) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0x0) 15:21:41 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300000200004292306353fd", 0x29, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:41 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:41 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:41 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273eea3e0", 0x48, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 181.995081] ================================================================================ [ 182.003817] UBSAN: Undefined behaviour in fs/jfs/jfs_mount.c:385:25 [ 182.010223] shift exponent -21516 is negative [ 182.014727] CPU: 1 PID: 9375 Comm: syz-executor.3 Not tainted 4.19.152-syzkaller #0 [ 182.022519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.031872] Call Trace: [ 182.034483] dump_stack+0x22c/0x33e [ 182.038122] ubsan_epilogue+0xe/0x3a [ 182.041847] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 182.048008] ? __bread_gfp+0x81/0x300 [ 182.051819] ? readSuper+0xf2/0x290 [ 182.055456] chkSuper.cold+0x1e/0x98 [ 182.059178] ? readSuper+0x290/0x290 [ 182.062901] ? do_raw_spin_lock+0xcb/0x220 [ 182.067145] jfs_mount+0x47/0x3d0 [ 182.070608] jfs_fill_super+0x55c/0xb50 [ 182.074588] ? parse_options+0xf50/0xf50 [ 182.078659] ? set_blocksize+0x163/0x3f0 [ 182.082733] mount_bdev+0x2fc/0x3b0 [ 182.086407] ? parse_options+0xf50/0xf50 [ 182.090478] mount_fs+0xa3/0x318 [ 182.093856] vfs_kern_mount.part.0+0x68/0x470 [ 182.098360] do_mount+0x51c/0x2f10 [ 182.101908] ? do_raw_spin_unlock+0x171/0x240 [ 182.106409] ? check_preemption_disabled+0x41/0x2b0 [ 182.111428] ? copy_mount_string+0x40/0x40 [ 182.115675] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 182.120525] ? copy_mount_options+0x261/0x370 [ 182.125033] ksys_mount+0xcf/0x130 [ 182.128571] __x64_sys_mount+0xba/0x150 [ 182.132547] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 182.137136] do_syscall_64+0xf9/0x670 [ 182.140946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.146141] RIP: 0033:0x4608aa [ 182.149336] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 182.168234] RSP: 002b:00007f2db42e0a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 182.175943] RAX: ffffffffffffffda RBX: 00007f2db42e0b20 RCX: 00000000004608aa [ 182.183209] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2db42e0ae0 15:21:41 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) [ 182.190475] RBP: 00007f2db42e0ae0 R08: 00007f2db42e0b20 R09: 0000000020000000 [ 182.197947] R10: 0000000000000003 R11: 0000000000000202 R12: 0000000020000000 [ 182.205222] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020064f00 [ 182.212618] ================================================================================ [ 182.256658] ================================================================================ [ 182.265369] UBSAN: Undefined behaviour in fs/jfs/jfs_imap.c:458:7 [ 182.271601] shift exponent 21528 is too large for 32-bit type 'unsigned int' [ 182.278791] CPU: 1 PID: 9375 Comm: syz-executor.3 Not tainted 4.19.152-syzkaller #0 [ 182.286581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.295929] Call Trace: [ 182.298525] dump_stack+0x22c/0x33e [ 182.302163] ubsan_epilogue+0xe/0x3a [ 182.305882] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 182.312036] ? do_raw_spin_unlock+0x171/0x240 [ 182.316539] diReadSpecial.cold+0x1b/0x3e [ 182.320722] jfs_mount+0x83/0x3d0 [ 182.324187] jfs_fill_super+0x55c/0xb50 [ 182.328166] ? parse_options+0xf50/0xf50 [ 182.332239] ? set_blocksize+0x163/0x3f0 [ 182.336313] mount_bdev+0x2fc/0x3b0 [ 182.339944] ? parse_options+0xf50/0xf50 [ 182.344018] mount_fs+0xa3/0x318 [ 182.347394] vfs_kern_mount.part.0+0x68/0x470 [ 182.351898] do_mount+0x51c/0x2f10 [ 182.355446] ? do_raw_spin_unlock+0x171/0x240 [ 182.359954] ? check_preemption_disabled+0x41/0x2b0 [ 182.364992] ? copy_mount_string+0x40/0x40 [ 182.369241] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 182.374088] ? copy_mount_options+0x261/0x370 [ 182.378585] ksys_mount+0xcf/0x130 [ 182.382141] __x64_sys_mount+0xba/0x150 [ 182.386117] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 182.390707] do_syscall_64+0xf9/0x670 [ 182.394516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.399705] RIP: 0033:0x4608aa [ 182.402897] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 182.421796] RSP: 002b:00007f2db42e0a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 182.429508] RAX: ffffffffffffffda RBX: 00007f2db42e0b20 RCX: 00000000004608aa [ 182.436777] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2db42e0ae0 [ 182.444049] RBP: 00007f2db42e0ae0 R08: 00007f2db42e0b20 R09: 0000000020000000 15:21:41 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 182.451318] R10: 0000000000000003 R11: 0000000000000202 R12: 0000000020000000 [ 182.458579] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020064f00 [ 182.465978] ================================================================================ 15:21:41 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273eea3e0", 0x48, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x84, @remote, 0x0, 0x1, 'dh\x00'}, 0x2c) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0x0) 15:21:41 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:41 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:43 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001ce252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011800)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101", 0x43, 0xf000}], 0x0, &(0x7f0000000140)) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x18) 15:21:43 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:43 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 15:21:43 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:43 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300000200004292306353fd", 0x29, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:44 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:44 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) lseek(r0, 0xfffffffffffffffe, 0x3) 15:21:44 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:44 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300000200004292306353fd", 0x29, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:44 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) 15:21:44 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:44 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001ce252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011800)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101", 0x43, 0xf000}], 0x0, &(0x7f0000000140)) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x18) 15:21:44 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:44 executing program 1: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, 0x0) 15:21:44 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 185.050812] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 185.066727] UDF-fs: Scanning with blocksize 512 failed [ 185.077935] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 15:21:44 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001ce252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011800)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101", 0x43, 0xf000}], 0x0, &(0x7f0000000140)) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x18) 15:21:44 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8100, &(0x7f0000001600)=ANY=[]) [ 185.099429] UDF-fs: Scanning with blocksize 1024 failed [ 185.108863] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 15:21:44 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300000200004292306353fd", 0x29, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x2, 0x3, 0x2d8, 0x190, 0x190, 0x0, 0x0, 0x0, 0x240, 0x240, 0x240, 0x240, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x190, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "bdc74c01369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa6ecab6b1d2cc05e3182f64694d7d05fb8b8c8f56627a54f905d564eeeb8334f650ca0f3c44f7fda4d20a55050342ea85ecc8838e7088de33582f36a0a375bb7008adc297a5ece1bb2df53d17bef26bb6f800", 0x7f}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x338) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) socket$alg(0x26, 0x5, 0x0) 15:21:44 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/153, 0x6c5b5f1f386a312d) [ 185.161277] UDF-fs: Scanning with blocksize 2048 failed [ 185.174778] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 185.186591] UDF-fs: Scanning with blocksize 4096 failed [ 185.248412] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 185.258075] Cannot find add_set index 0 as target 15:21:44 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, 0x0, 0x0) 15:21:44 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300000200004292306353fd", 0x29, 0x8000}], 0x3, &(0x7f0000064f00)) [ 185.290057] Cannot find add_set index 0 as target [ 185.341883] VFS: could not find a valid V7 on loop0. 15:21:44 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x2, 0x3, 0x2d8, 0x190, 0x190, 0x0, 0x0, 0x0, 0x240, 0x240, 0x240, 0x240, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x190, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "bdc74c01369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa6ecab6b1d2cc05e3182f64694d7d05fb8b8c8f56627a54f905d564eeeb8334f650ca0f3c44f7fda4d20a55050342ea85ecc8838e7088de33582f36a0a375bb7008adc297a5ece1bb2df53d17bef26bb6f800", 0x7f}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x338) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) socket$alg(0x26, 0x5, 0x0) 15:21:44 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, 0x0, 0x0) 15:21:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x800, 0x1}, 0x20) 15:21:44 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:44 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300000200004292306353fd", 0x29, 0x8000}], 0x3, &(0x7f0000064f00)) [ 185.431524] Cannot find add_set index 0 as target 15:21:44 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffedf, &(0x7f0000000000)='/proc/\x00\x00s/sy\x00\xef\xffZ\xff\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, 0x0, 0x0) 15:21:44 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x181001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x2, 0x0, 0x0}) 15:21:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4a06b29e220dc28dac72599456d464419e5b2fc70b72c0bb8e90f61cc4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ef1084a12f56d157264529c09c460f58837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a20819e02cc22e6b652b1673773ae3cab8d7674c6c4dca2f1b4d74fffffffff9d441d42f49db6d4a4762e5cc23f2c1adafd1e5a3e7f2e888961cb43e438c4e41ae43ea118e1407a601dae4b8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa2285b6e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a0e3ed34258b8c9370634060105baa664953514605fba3973aa021945b985a8a66e9cfa9d9e57033815717b4fdbe55b37cb8d7f41aacfbd9b5a759a703e71f358e11ac8e13df15d792e604a4f279b3bd6621bdf2c17bc0400000000000000ff8dc4006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11a755761fe46169b2b5b8cdedb695cc425fe203d2f2655a76865c2cb4e2470fcfb1248c0add5431a7fbcb0ef4f66809af93a09fab1daae4b518d7a5d95a017864487366d6d7ee7bb00200000000000000c60fca2e2981b22d08f874e0a9cb6fca78d6f1b18fe380df4bf024f120bd505d82033f2fb7d8fc9e0d773294e097e293db58993c0024ab2fd8e5e7003af92d11de48e8b4d32972cba6f49051cec1bf6f16231bbb90a2b601e5a47811a2278a03bf7700b06fa191ebd3a0c2ef0058ffebd7ccde24f18e4bf7156edc4ef81f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f83074192c48c631ed2eb54e888de7164a027cf6a99cf7a384f52b8eeb70571e5bbb3e6d2b5eba52bee6f81968981811f832d064048c0e0bbe46984b2f0d0504255c22ee8674053d0e1000000006edf56a93d0a7a6f088925e872ef8b4f31e6f57ba631070029031aae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875858e083144526110e1ae22fd90c1360c056430f677ee7ed7ac1f9743786b2fb8d0fcfcc3d36c93230b7b059bc295aa0e38b1c3edc349ab96e73d2060acfd8145e4a5851bc4a51ab87068468d3ba396d6fd6741fce0834c65c5ad939d7795f3879baa88bd0c84892c97c80987e5c7954e9f3694d116b01ce0b8ef953de70e7ce0311c8b018956f8a42ca26ab295f1ecf617a8dc38e525f415a1bd46b38845ebca04061bacbf627f798c7f520078fee48f83b5989543729e57a9e1d686bc86cd51704f309130f5347413776a7b7bea3c46c0c4c4b7c27c45057d95ac85ac3b1e1d24d572a8a0605b24f70bdc4c241cdcee8e6fa31fc02137ed1fb4b21c13b9a2c5e3f7c9ef9c45a314a6f0b9352be92986d63263b1aa5264cb4a82cf083de3b4ab6368e95dd4fdf6710cd4a79651dc3e1e056c3ecd6b51f30663cc256094c840662e09ab831b7bae9aec6d7259250016795cf91f12dbb72fc321c3dfb5f9181529906b43f9d6b8ce9fad13e1085cafd41183908173e16e40037681835aa080f34b87bba0be276340295062f671e933292e32036cbd03f9a4cd660a94374b013e9f32a6bfb65417b5372bc1cd8f67f975358140384a1ca0537fd3a2a2c37006e4b30ffe469bba4251aa3ba4626acd810000000000000000ee37c63f7f295579f542b12f248f4b6ba14448abab540fb7d98a081f3d3c946455d61734855005bcc876bd15a76dd552f9bfeb091a4e82a5d11033e528b133103f5592d5684a57dd70556818ea30e03dc2a6eb69423e4f27034351809da4e5002aa346d4d3e0e2a5a9ba1130b4fe983fc344c1de9f536cff06187599523cbddcd8ffc2d11d5db7712be71c0d74a5ae4e8ff6e65238bb23ea2a979d3e8ab83857a1607dc612f0d844922519e229a2dfcaa98845bc7521527c6216c39977341bbd23ed0a1987fc81a42d067c74d2fa807a4fc4870b0836ee8b6782cf599031451a4756d93302a94d4fe42ea6"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000632f77fbac141417ee", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) [ 185.541453] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 185.554251] UDF-fs: Scanning with blocksize 512 failed [ 185.578358] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 185.594550] VFS: could not find a valid V7 on loop0. 15:21:44 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000340)=""/37) 15:21:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000140)={0x1, 0x0, [{0x40000001, 0x2, 0x3}]}) [ 185.618518] UDF-fs: Scanning with blocksize 1024 failed [ 185.648950] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 185.666501] UDF-fs: Scanning with blocksize 2048 failed 15:21:44 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8100, &(0x7f0000001600)=ANY=[]) [ 185.692377] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 185.714297] UDF-fs: Scanning with blocksize 4096 failed [ 185.727030] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 185.785649] VFS: could not find a valid V7 on loop0. 15:21:45 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:45 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300000200004292306353fd", 0x29, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:45 executing program 1: mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mknod$loop(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on,']) unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000010300)="0300000004", 0x5, 0x800}, {0x0}, {0x0, 0x0, 0x3fbfc}], 0xa04000, 0x0) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x3}}) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000200)={0x90, 0x0, 0x0, {0x6, 0x3, 0x80, 0x0, 0xd428, 0x2, {0x6, 0x6, 0x0, 0x3802f9ba, 0x80000000, 0x8, 0x0, 0xbb0, 0x0, 0xa000, 0x0, 0x0, 0x0, 0x3ff}}}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000200)='./bus/file0\x00') 15:21:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@ipv4_newroute={0x38, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, @LWTUNNEL_IP_OPT_VXLAN_GBP={0x4}}}}]}, 0x38}}, 0x0) 15:21:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) 15:21:45 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 185.942189] VFS: could not find a valid V7 on loop0. [ 185.958004] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 185.968515] UDF-fs: Scanning with blocksize 512 failed 15:21:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300000200004292306353fd", 0x29, 0x8000}], 0x3, &(0x7f0000064f00)) [ 185.986913] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 186.008002] UDF-fs: Scanning with blocksize 1024 failed [ 186.017196] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 186.024462] UDF-fs: Scanning with blocksize 2048 failed [ 186.030505] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 186.038050] UDF-fs: Scanning with blocksize 4096 failed 15:21:45 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 186.088393] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 15:21:45 executing program 5: dup(0xffffffffffffffff) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) 15:21:45 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r1, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)='\n', 0x1}], 0x1}}], 0x1, 0x2400c06d) 15:21:45 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300000200004292306353fd", 0x29, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) pipe(&(0x7f0000000300)={0xffffffffffffffff}) dup3(r1, r0, 0x0) r2 = dup(r0) ioctl$KDDELIO(r2, 0x541b, 0x203fffdd) [ 186.291968] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 186.301874] VFS: could not find a valid V7 on loop0. [ 186.381864] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 186.388933] UDF-fs: Scanning with blocksize 512 failed [ 186.406911] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 186.416567] UDF-fs: Scanning with blocksize 1024 failed [ 186.423551] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 186.430625] UDF-fs: Scanning with blocksize 2048 failed 15:21:45 executing program 1: mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mknod$loop(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on,']) unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000010300)="0300000004", 0x5, 0x800}, {0x0}, {0x0, 0x0, 0x3fbfc}], 0xa04000, 0x0) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x3}}) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000200)={0x90, 0x0, 0x0, {0x6, 0x3, 0x80, 0x0, 0xd428, 0x2, {0x6, 0x6, 0x0, 0x3802f9ba, 0x80000000, 0x8, 0x0, 0xbb0, 0x0, 0xa000, 0x0, 0x0, 0x0, 0x3ff}}}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000200)='./bus/file0\x00') 15:21:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}]}]}, 0x58}}, 0x0) 15:21:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300000200004292306353fd", 0x29, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:45 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 186.459669] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 15:21:45 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0xfffffffffffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 186.516474] UDF-fs: Scanning with blocksize 4096 failed [ 186.545000] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 15:21:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x13000011, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b7020000f7ff0900bfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c222375e37391b130150c62fc2868f020000000000000013a80c19aab9d611f5969f62c28b22756bedf3cf393d14c46cc4f716da4f0de8163f6242fa7323f1740637c48468766a1841439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558050400ff0498dc4ea1d75d3066d52dbb55d0e331a5fb33abadd3a0c218078be8d75aabad71bfc70281251ab136740a4781353d114e024762f07612b1c3d686f1264c8fc62e06000000fda8c226f236b2b017b569762fa39884bd1dc08eb9d6c91b9364b7bcf572d0cb617949863303de732a92ce1bdc2fc568652ea4e96ceb14693c84382d3b09a1000000000000000000000000ae8d804b53c7e864d994800486ce4d2f3b58a947ef31f1d41d2b16454add03e2aec5f9c93f9d3e43a52d2c615cdd265e649c770cfa9b47b812c79bf0a685ce152bc4fdb7c49e5c4643ff8902de09ff8fe5709f06f2dcc31cc45c"], &(0x7f0000000280)='GPL\x00'}, 0x48) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) r2 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) [ 186.641589] VFS: could not find a valid V7 on loop0. 15:21:45 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) [ 186.829574] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 186.867946] UDF-fs: Scanning with blocksize 512 failed [ 186.919436] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 186.952408] UDF-fs: Scanning with blocksize 1024 failed [ 186.984894] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 186.997410] UDF-fs: Scanning with blocksize 2048 failed [ 187.004778] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 187.021377] UDF-fs: Scanning with blocksize 4096 failed [ 187.026927] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 15:21:46 executing program 5: dup(0xffffffffffffffff) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) 15:21:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000064f00)) 15:21:46 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100), 0x0, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:46 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)={0x58, r0, 0x1, 0x0, 0x0, {0x33}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}]}, 0x58}}, 0x0) 15:21:46 executing program 1: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000001500)={{0x2, 0x0, @empty}, {}, 0x0, {0x2, 0x0, @loopback}, 'veth1_virt_wifi\x00'}) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa2}}], 0x400000000000953, 0x42, 0x0) 15:21:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000064f00)) 15:21:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x34, 0x0, 0xb, 0x101, 0x0, 0x0, {0x3}, [@NFCTH_TUPLE={0xc, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @NFCTH_QUEUE_NUM={0x8}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x34}}, 0x0) 15:21:46 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="07010300ca00010026603800000000000000000004000000010000010000000000000000200000000018004004000000001a0040130000000010004038000000001e054041", 0x45}, {0x0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) [ 187.133411] VFS: could not find a valid V7 on loop0. 15:21:46 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100), 0x0, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000064f00)) 15:21:46 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$cont(0x20, r2, 0x0, 0x0) [ 187.232744] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 187.255082] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 187.264122] UDF-fs: Scanning with blocksize 512 failed [ 187.274213] VFS: could not find a valid V7 on loop0. 15:21:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x34, 0x0, 0xb, 0x101, 0x0, 0x0, {0x3}, [@NFCTH_TUPLE={0xc, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @NFCTH_QUEUE_NUM={0x8}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x34}}, 0x0) 15:21:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 15:21:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x3, &(0x7f0000064f00)) 15:21:46 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100), 0x0, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 187.286093] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 187.324149] UDF-fs: Scanning with blocksize 1024 failed 15:21:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000029c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xc}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x14, 0x2, [@TCA_BASIC_EMATCHES={0x10, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x4}]}]}}]}, 0x44}}, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmmsg$alg(r3, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 187.379559] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 187.394040] UDF-fs: Scanning with blocksize 2048 failed [ 187.402249] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 187.411833] EXT4-fs (loop5): Can't read superblock on 2nd try [ 187.415030] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 15:21:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 187.426945] UDF-fs: Scanning with blocksize 4096 failed [ 187.435313] VFS: could not find a valid V7 on loop0. [ 187.443598] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 187.452719] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 15:21:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc) [ 187.488501] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 15:21:46 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x7fffefff, 0x0) unshare(0x40000000) 15:21:46 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:46 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579", 0x24, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x3, &(0x7f0000064f00)) [ 187.581631] EXT4-fs (loop5): Can't read superblock on 2nd try 15:21:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@can_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) 15:21:46 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x101802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) dup(0xffffffffffffffff) [ 187.740330] IPVS: ftp: loaded support on port[0] = 21 [ 187.752053] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 15:21:46 executing program 5: open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) [ 187.787854] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 187.803035] VFS: could not find a valid V7 on loop0. 15:21:47 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x3, &(0x7f0000064f00)) [ 187.836300] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 15:21:47 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579", 0x24, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 187.925766] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 15:21:47 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x3, &(0x7f0000064f00)) [ 187.980553] UDF-fs: Scanning with blocksize 512 failed [ 187.992843] VFS: could not find a valid V7 on loop0. [ 188.044850] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 15:21:47 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32, @ANYBLOB="77242964ec01a8"], 0x48}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="c10000000000fcdbdf25020000000c0004000004000000000000b128e97df5"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a0000000a000000250000000206e73ba8f4952bedc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit'}}]}) 15:21:47 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579", 0x24, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 188.137356] IPVS: ftp: loaded support on port[0] = 21 [ 188.179509] EXT4-fs (loop5): Couldn't mount because of unsupported optional features (7de80821) [ 188.190032] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 188.266057] VFS: could not find a valid V7 on loop0. [ 188.271626] EXT4-fs (loop5): Couldn't mount because of unsupported optional features (7de80821) [ 188.285918] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 188.304334] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 188.313170] UDF-fs: Scanning with blocksize 1024 failed [ 188.331879] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 188.345627] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 188.357296] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 188.380520] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 188.388154] UDF-fs: Scanning with blocksize 2048 failed [ 188.395170] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 188.406704] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 188.416729] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 188.427880] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 188.442470] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 188.449604] UDF-fs: Scanning with blocksize 4096 failed 15:21:47 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x7fffefff, 0x0) unshare(0x40000000) [ 188.466219] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 15:21:47 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:47 executing program 5: unshare(0x20020000) mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) poll(0x0, 0x0, 0x400007f) rmdir(&(0x7f00000000c0)='./file0\x00') 15:21:47 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6", 0x36, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:47 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:47 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x3ff, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000580)={@in, 0x0, 0x40, 0x30, 0x0, "000000000000000000000000000000225f15d80700000000000000000003008000000000080000000000000000000000e7ffffff000000000000000000000000000000000000002000"}, 0xd8) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0x100000530) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(0xffffffffffffffff, 0xc008551b, 0x0) [ 188.623081] VFS: could not find a valid V7 on loop0. 15:21:47 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6", 0x36, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 188.689101] IPVS: ftp: loaded support on port[0] = 21 [ 188.704741] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 15:21:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x3, &(0x7f0000064f00)) [ 188.784257] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 188.852018] VFS: could not find a valid V7 on loop0. 15:21:48 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6", 0x36, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 188.875035] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 188.958841] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 188.979111] UDF-fs: Scanning with blocksize 512 failed [ 189.003955] VFS: could not find a valid V7 on loop0. 15:21:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380), 0x0, 0x8000}], 0x3, &(0x7f0000064f00)) [ 189.028801] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 15:21:48 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce254", 0x3f, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 189.116582] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 189.167884] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 189.203628] VFS: could not find a valid V7 on loop0. 15:21:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380), 0x0, 0x8000}], 0x3, &(0x7f0000064f00)) [ 189.305622] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 189.363932] UDF-fs: Scanning with blocksize 1024 failed [ 189.370329] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 189.445386] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 189.475086] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 189.485412] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 15:21:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 15:21:48 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce254", 0x3f, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380), 0x0, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:48 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) splice(r1, 0x0, r0, &(0x7f0000000080), 0x8, 0x0) [ 189.551022] UDF-fs: Scanning with blocksize 2048 failed [ 189.567959] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 189.584531] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 189.605081] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 189.620485] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 189.639507] VFS: could not find a valid V7 on loop0. [ 189.649934] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 189.661987] UDF-fs: Scanning with blocksize 4096 failed [ 189.667449] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 15:21:48 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:48 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 15:21:48 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000000)) 15:21:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x60}}, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001800010000000000000000000a000000feffff05000000001c0016"], 0x40}}, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 15:21:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4", 0x15, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:48 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce254", 0x3f, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 189.804353] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:21:49 executing program 5: syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2f3}], 0x0, &(0x7f0000010300)) 15:21:49 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01", @ANYRES32=0x0], &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x71, &(0x7f0000000040)={r2}, 0x8) 15:21:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4", 0x15, 0x8000}], 0x3, &(0x7f0000064f00)) [ 189.877386] VFS: could not find a valid V7 on loop0. 15:21:49 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e502", 0x44, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) [ 189.953823] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 189.993243] SQUASHFS error: zlib decompression failed, data probably corrupt [ 190.025472] SQUASHFS error: squashfs_read_data failed to read block 0x9e [ 190.032928] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 190.042644] SQUASHFS error: Unable to read metadata cache entry [9e] [ 190.058825] SQUASHFS error: Unable to read inode 0x50026 [ 190.064695] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 190.087665] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 190.106744] UDF-fs: Scanning with blocksize 512 failed 15:21:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4", 0x15, 0x8000}], 0x3, &(0x7f0000064f00)) [ 190.138504] VFS: could not find a valid V7 on loop0. [ 190.156281] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 15:21:49 executing program 5: syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2f3}], 0x0, &(0x7f0000010300)) [ 190.203921] SQUASHFS error: zlib decompression failed, data probably corrupt [ 190.212025] SQUASHFS error: squashfs_read_data failed to read block 0x9e [ 190.219073] SQUASHFS error: Unable to read metadata cache entry [9e] [ 190.228581] SQUASHFS error: Unable to read inode 0x50026 [ 190.251407] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 190.260553] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 190.302963] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 190.340948] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 190.347911] UDF-fs: Scanning with blocksize 1024 failed [ 190.361815] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 190.376233] SQUASHFS error: zlib decompression failed, data probably corrupt [ 190.394040] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 190.405137] SQUASHFS error: squashfs_read_data failed to read block 0x9e [ 190.413979] SQUASHFS error: Unable to read metadata cache entry [9e] [ 190.420793] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 190.432265] SQUASHFS error: Unable to read inode 0x50026 [ 190.471409] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 190.489417] UDF-fs: Scanning with blocksize 2048 failed [ 190.501775] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 190.531190] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 190.541740] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 190.566862] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 15:21:49 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:49 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e502", 0x44, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300", 0x1f, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:49 executing program 5: syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2f3}], 0x0, &(0x7f0000010300)) 15:21:49 executing program 2: setresuid(0xee01, 0xee01, 0x0) pivot_root(0x0, 0x0) [ 190.586577] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 190.605530] UDF-fs: Scanning with blocksize 4096 failed [ 190.612219] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 190.688090] VFS: could not find a valid V7 on loop0. 15:21:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300", 0x1f, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:49 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0x0, 0x0, 0x0, 0x3, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 190.763148] SQUASHFS error: zlib decompression failed, data probably corrupt [ 190.804985] SQUASHFS error: squashfs_read_data failed to read block 0x9e 15:21:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 15:21:50 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e502", 0x44, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8073a1, 0x8}, 0x20) [ 190.861881] SQUASHFS error: Unable to read metadata cache entry [9e] [ 190.905595] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 190.915557] SQUASHFS error: Unable to read inode 0x50026 15:21:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c000300", 0x1f, 0x8000}], 0x3, &(0x7f0000064f00)) [ 190.996859] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 15:21:50 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000400)=[{&(0x7f00000002c0)="e6", 0x1}, {&(0x7f0000000100)="f9", 0x1}, {&(0x7f0000000180)="776d9d388685e51b4fd049bd41f4a9d2718bb1194c9571ac13be7a8ec706716cff46510d72da87019cc45e023273f29a0733ecb521acce2db5de1f196d24fb142c36e1858d9e2e5be0c96d63ce5320426e6727db51bec85eab8117933ce5dea0d34c7200767ede0fbf7e4a2891d30980a487e87ffde528185fbfab8ed38e15c224a0f96b9e3c309181c317ddb729845f095a50540bc54cb008fc2da2e990602c09dee2954944abbee35a80b9b72e7263b517eb99488302eb7247a902cd40f904f2e596bafb7458a99c6ed3e070af0e4b0c3e00513dd69c895d93de1e3a4a78", 0xdf}, {&(0x7f00000005c0)="11ac325e27208134172147b9f04e79c0319f4958549530d153f8578649c513b1c60a4bc687ae751b862b215361289bce42395c79829be73981714f227784cc213516ecdaece733d76269c43a7ea568ffe36c460363a8e7b0364610a4fe8d6ae0c7875d5115d6b733f9ee0d7df117be76ff887b6982fc4771178c26ea581945015faa6a34", 0xfffffc43}], 0x4, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000000, 0x0) [ 191.041033] VFS: could not find a valid V7 on loop0. [ 191.052616] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 191.068900] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 191.078393] UDF-fs: Scanning with blocksize 512 failed [ 191.103495] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 191.136130] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 191.198130] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 191.226642] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 191.235166] UDF-fs: Scanning with blocksize 1024 failed [ 191.248579] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 191.278313] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 191.333626] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 191.392644] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 191.440495] UDF-fs: Scanning with blocksize 2048 failed [ 191.466821] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 191.498036] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 191.525884] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 191.553960] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 [ 191.588484] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 191.605066] UDF-fs: Scanning with blocksize 4096 failed [ 191.615813] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 15:21:50 executing program 4: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0xfc3a0}], 0x0, &(0x7f0000000580)={[{@novrs='novrs'}]}) 15:21:50 executing program 5: syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2f3}], 0x0, &(0x7f0000010300)) 15:21:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000040)={'macvtap0\x00', @ifru_data=0x0}) 15:21:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c0003000002000042", 0x24, 0x8000}], 0x3, &(0x7f0000064f00)) 15:21:50 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273ee", 0x46, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:50 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000004c0)=@newqdisc={0xac, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x7c, 0x2, {{}, [@TCA_NETEM_LOSS={0x60, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0x18}, @NETEM_LOSS_GE={0x14, 0x2, {0x7fff}}, @NETEM_LOSS_GI={0x18}, @NETEM_LOSS_GI={0x18}]}]}}}]}, 0xac}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f0000001540)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x2a, 0x0, "d06bdda952daf03c08a4bcd60a6445964f031512956da90ef6a6007becc35f97123408004e686bd9f9b43dde35902645b25d7051dbc40730b90721d0d4d91afc9243afe5540cb07fc6f1a432fa00"}, 0xd8) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf0}, 0x14) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfcf) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000040)=0xffffffff) 15:21:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "9765e32b2071ff4c", "46e9ce224e2717416251bfa4308a9e99", "dac6d9f4", "d15623df191b5941"}, 0x28) mmap(&(0x7f0000895000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:21:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="4a46533101000000607600000000100000100000f4abdfac572d3e0c0003000002000042", 0x24, 0x8000}], 0x3, &(0x7f0000064f00)) [ 191.835376] SQUASHFS error: zlib decompression failed, data probably corrupt [ 191.862946] VFS: could not find a valid V7 on loop0. [ 191.874726] SQUASHFS error: squashfs_read_data failed to read block 0x9e 15:21:51 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) ioctl$USBDEVFS_CONNECTINFO(r0, 0x40085511, &(0x7f0000000000)) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r4 = dup(r3) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000200)={0x3, 0x0, @start={0x7, 0x1}}) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 191.898188] SQUASHFS error: Unable to read metadata cache entry [9e] [ 191.908378] SQUASHFS error: Unable to read inode 0x50026 15:21:51 executing program 0: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4172e50273ee", 0x46, 0x401}], 0x8100, &(0x7f0000001600)=ANY=[]) 15:21:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/169, 0xa9}], 0x1, 0x3, 0x0) 15:21:51 executing program 5: syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2f3}], 0x0, &(0x7f0000010300)) [ 191.970236] UDF-fs: error (device loop4): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0