9 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00'}, 0xd) 10:38:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 175.179111][ T9379] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 10:38:59 executing program 1: tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000280)={0x0, 0x2, 0x1000, 0x3}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400240) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$cgroup_int(r2, &(0x7f0000000000)=0x6, 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0xc0a85352, &(0x7f00000001c0)={{0x9, 0x6}, 'port0\x00', 0x0, 0x80002, 0x0, 0x8, 0x44, 0x40, 0x8000, 0x0, 0x1, 0x7}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write(r5, &(0x7f0000000100)="1c00000019002551075c0165ff0ffc028020000300040005", 0x18) close(r4) socket(0x10, 0x3, 0x0) splice(r3, 0x0, r4, 0x0, 0x10000, 0x0) 10:38:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:38:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:38:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x5c, 0x12, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x2c, 0x2, [@TCA_BASIC_EMATCHES={0x28, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, 0x0, 0x1, [@TCF_EM_META={0x18, 0x0, 0x0, 0x0, {{}, [@TCA_EM_META_HDR={0xc}]}}]}]}]}}]}, 0x5c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x24, r2, 0x711, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, r2, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xb}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5a}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="15022f7b36de"}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 10:38:59 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,ui', @ANYRESDEC, @ANYBLOB=',\x00']) 10:38:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:38:59 executing program 1: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macsec0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32, @ANYBLOB="9b3b6f0dffff000000000000a37b3ee294461d0af4dcafda48d52ae870643e03e100"/49], 0x28}}, 0x0) 10:38:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = fcntl$dupfd(r2, 0x0, r1) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r1, 0x0, 0x7ffffffe, 0x4) 10:38:59 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,ui', @ANYRESDEC, @ANYBLOB=',\x00']) 10:38:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:38:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000040)="ac", 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0xfea6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xb}]}, @var={0x3, 0x0, 0x0, 0xe, 0x4}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0x9, 0x2}, {0xf, 0x7}, {0x5, 0x9}, {0xc, 0xfffffffe}, {0x0, 0x8}, {0xd, 0xffff}]}]}}, &(0x7f0000000300)=""/175, 0x86, 0xaf, 0x1}, 0x20) 10:38:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:38:59 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid', @ANYRESDEC, @ANYBLOB=',\x00']) 10:38:59 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010000d07000c7f793f000000ff030000", @ANYRES32=r6, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000f79904fdca84a8de445ef454457a0b7761ae26b0ffffa6409b17e7149a2b000e91a052f72958", @ANYRES64], 0x4}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001180)={0x1c, r8, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r8, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'vxcan1\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000041}, 0x8844) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x3561c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x44}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl(r9, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000300)={0x6, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 10:38:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000080)=0x2, 0x1b4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x10000, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xc8, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x3}, [@CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1ea8}, @CTA_EXPECT_NAT={0xac, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @rand_addr=0xbdd}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) fcntl$getown(r2, 0x9) sendto$inet6(r0, 0x0, 0xffffffffffffff7b, 0x0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @remote}, 0x1c) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x2a945e89, 0xc00) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2000) 10:38:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) 10:38:59 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid', @ANYRESDEC, @ANYBLOB=',\x00']) 10:38:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) 10:38:59 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:00 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = fcntl$dupfd(r2, 0x0, r1) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r1, 0x0, 0x7ffffffe, 0x4) 10:39:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000a40012000900010076657468df000000180002001400010000002000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x5}, {}, {0xf}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x8, 0x2b, 0x20, 0x1, 0x0, 0x7, 0x204, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x2, @perf_config_ext={0x10000, 0x3}, 0x4800, 0x0, 0xffffffff, 0x5, 0x5, 0x2, 0x100}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r8 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r10 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r10, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_ax25_SIOCDELRT(r10, 0x890c, &(0x7f0000000340)={@default, @null, 0x1, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r9}}, 0x20}}, 0x0) 10:39:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) 10:39:00 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 176.553735][ T9481] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 176.663607][ T9486] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 10:39:00 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r0}, 0xd) 10:39:00 executing program 2: add_key(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xc, &(0x7f0000000080)={0x37ea38a0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000100)) syz_open_procfs(0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='user\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x20000000, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$setsig(0x4203, 0x0, 0xffffffff, &(0x7f0000000100)={0x2e, 0x0, 0x3f}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @local, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x0, 0x0, 0x4}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 10:39:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r0}, 0xd) 10:39:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r0}, 0xd) 10:39:00 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x7a, 0x0, &(0x7f00000001c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r4, r3, 0x0, 0x100000001) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r6, r5, 0x0, 0x100000001) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 10:39:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 177.308751][ T23] audit: type=1804 audit(1585478341.222:2): pid=9522 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir696934108/syzkaller.4HeeFB/33/cgroup.controllers" dev="sda1" ino=15890 res=1 10:39:01 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = fcntl$dupfd(r2, 0x0, r1) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r1, 0x0, 0x7ffffffe, 0x4) 10:39:01 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xd) 10:39:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 177.392252][ T23] audit: type=1804 audit(1585478341.302:3): pid=9522 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir696934108/syzkaller.4HeeFB/33/cgroup.controllers" dev="sda1" ino=15890 res=1 10:39:01 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xd) 10:39:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:01 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xd) 10:39:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB, @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB, @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 177.983118][ T9553] IPVS: ftp: loaded support on port[0] = 21 10:39:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:02 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB, @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:02 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:02 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sy', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:02 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sy', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 178.426715][ T9602] IPVS: ftp: loaded support on port[0] = 21 10:39:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xd) 10:39:02 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sy', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xd) 10:39:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xd) 10:39:02 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) [ 178.822092][ T9647] IPVS: ftp: loaded support on port[0] = 21 [ 178.875395][ T312] tipc: TX() has been purged, node left! 10:39:03 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:03 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) 10:39:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) [ 179.319922][ T9689] IPVS: ftp: loaded support on port[0] = 21 10:39:03 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) 10:39:03 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fown', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) 10:39:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) fcntl$dupfd(r1, 0x0, r1) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:03 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fown', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) [ 179.821891][ T9733] IPVS: ftp: loaded support on port[0] = 21 10:39:04 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:04 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fown', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:04 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) fcntl$dupfd(r1, 0x0, r1) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) 10:39:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) [ 180.217456][ T9774] IPVS: ftp: loaded support on port[0] = 21 10:39:04 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) 10:39:04 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:04 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) fcntl$dupfd(r1, 0x0, r1) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 180.575384][ T9815] IPVS: ftp: loaded support on port[0] = 21 10:39:04 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:04 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:05 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = fcntl$dupfd(r2, 0x0, r1) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x7ffffffe, 0x4) [ 181.158807][ T9859] IPVS: ftp: loaded support on port[0] = 21 10:39:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = fcntl$dupfd(r2, 0x0, r1) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x7ffffffe, 0x4) 10:39:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:05 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:05 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = fcntl$dupfd(r2, 0x0, r1) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x7ffffffe, 0x4) 10:39:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7ffffffe, 0x4) 10:39:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:05 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 181.588961][ T9909] IPVS: ftp: loaded support on port[0] = 21 10:39:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7ffffffe, 0x4) 10:39:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:05 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7ffffffe, 0x4) 10:39:05 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x0, 0x4) [ 181.992163][ T9961] IPVS: ftp: loaded support on port[0] = 21 10:39:05 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:06 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x0, 0x4) 10:39:06 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:06 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x0, 0x4) 10:39:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:06 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:06 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x0) 10:39:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 182.446618][T10010] IPVS: ftp: loaded support on port[0] = 21 10:39:06 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e73747275737465647365", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:06 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x0) [ 182.657009][T10021] syz-executor.0 (10021) used greatest stack depth: 24616 bytes left 10:39:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:06 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e73747275737465647365", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 182.780094][T10051] IPVS: ftp: loaded support on port[0] = 21 10:39:06 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x0) 10:39:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:06 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e73747275737465647365", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:07 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 183.193907][T10101] IPVS: ftp: loaded support on port[0] = 21 [ 183.206672][T10095] IPVS: ftp: loaded support on port[0] = 21 10:39:07 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:07 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 183.618548][T10164] IPVS: ftp: loaded support on port[0] = 21 10:39:07 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 183.808450][T10181] IPVS: ftp: loaded support on port[0] = 21 10:39:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:07 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x0, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 183.997168][T10224] IPVS: ftp: loaded support on port[0] = 21 10:39:07 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) fcntl$dupfd(r1, 0x0, r1) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x0, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 184.187686][T10244] IPVS: ftp: loaded support on port[0] = 21 10:39:08 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:08 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x0, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:08 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 184.437106][T10290] IPVS: ftp: loaded support on port[0] = 21 10:39:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, 0x0, &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:08 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:08 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) [ 184.693328][T10323] IPVS: ftp: loaded support on port[0] = 21 [ 184.701449][T10331] IPVS: ftp: loaded support on port[0] = 21 10:39:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, 0x0, &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:08 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, 0x0, &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:08 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:08 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) [ 185.073522][T10386] IPVS: ftp: loaded support on port[0] = 21 [ 185.159944][T10398] IPVS: ftp: loaded support on port[0] = 21 10:39:09 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:09 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:09 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) pidfd_getfd(r2, r1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) [ 185.470946][T10453] IPVS: ftp: loaded support on port[0] = 21 10:39:09 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 10:39:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) [ 185.688703][T10485] IPVS: ftp: loaded support on port[0] = 21 10:39:09 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 185.817089][T10498] IPVS: ftp: loaded support on port[0] = 21 10:39:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 10:39:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 10:39:10 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 186.037288][ T312] tipc: TX() has been purged, node left! 10:39:10 executing program 0 (fault-call:8 fault-nth:0): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:10 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 186.172917][T10537] FAULT_INJECTION: forcing a failure. [ 186.172917][T10537] name failslab, interval 1, probability 0, space 0, times 1 [ 186.226771][T10537] CPU: 1 PID: 10537 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 [ 186.235633][T10537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.245700][T10537] Call Trace: [ 186.249011][T10537] dump_stack+0x1e9/0x30e [ 186.253367][T10537] should_fail+0x433/0x5b0 [ 186.257813][T10537] ? dst_alloc+0x16c/0x570 [ 186.262242][T10537] should_failslab+0x5/0x20 [ 186.266898][T10537] kmem_cache_alloc+0x53/0x2d0 [ 186.271691][T10537] dst_alloc+0x16c/0x570 [ 186.275956][T10537] ip_route_output_key_hash_rcu+0x136d/0x26a0 [ 186.282060][T10537] ip_route_output_key_hash+0x14a/0x260 [ 186.287636][T10537] ip_route_output_flow+0x25/0xb0 [ 186.292674][T10537] raw_sendmsg+0x1367/0x35e0 [ 186.297386][T10537] ? sock_rps_record_flow+0x1c/0x370 [ 186.302672][T10537] ? inet_sendmsg+0x80/0x310 [ 186.307270][T10537] ? inet_send_prepare+0x250/0x250 [ 186.312391][T10537] kernel_sendmsg+0xe2/0x120 [ 186.316992][T10537] sock_no_sendpage+0xe0/0x120 [ 186.321787][T10537] ? inet_sendmsg+0x310/0x310 [ 186.326476][T10537] sock_sendpage+0xd0/0x120 [ 186.330999][T10537] pipe_to_sendpage+0x208/0x2d0 [ 186.335859][T10537] ? sock_fasync+0xf0/0xf0 [ 186.340279][T10537] __splice_from_pipe+0x329/0x870 [ 186.345325][T10537] ? generic_splice_sendpage+0x180/0x180 [ 186.350969][T10537] generic_splice_sendpage+0x112/0x180 [ 186.356441][T10537] ? rw_verify_area+0x170/0x340 [ 186.361308][T10537] ? iter_file_splice_write+0xe20/0xe20 [ 186.366871][T10537] __se_sys_splice+0x7e4/0x1ad0 [ 186.371740][T10537] ? ksys_write+0x1ab/0x220 [ 186.376253][T10537] ? check_preemption_disabled+0xb0/0x240 [ 186.381980][T10537] ? debug_smp_processor_id+0x5/0x20 [ 186.387279][T10537] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 186.393011][T10537] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 186.399100][T10537] do_syscall_64+0xf3/0x1b0 [ 186.403609][T10537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.409510][T10537] RIP: 0033:0x45c849 [ 186.413422][T10537] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.433054][T10537] RSP: 002b:00007f3ff13b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 186.441483][T10537] RAX: ffffffffffffffda RBX: 00007f3ff13b86d4 RCX: 000000000045c849 [ 186.449461][T10537] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 186.457436][T10537] RBP: 000000000076bf00 R08: 000000007ffffffe R09: 0000000000000004 [ 186.465412][T10537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 10:39:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={0x0, r3}, 0x10) [ 186.473390][T10537] R13: 0000000000000ba2 R14: 00000000004ce68a R15: 0000000000000000 10:39:10 executing program 0 (fault-call:8 fault-nth:1): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 186.575094][ T312] tipc: TX() has been purged, node left! 10:39:10 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={0x0, r3}, 0x10) [ 186.677281][T10554] FAULT_INJECTION: forcing a failure. [ 186.677281][T10554] name failslab, interval 1, probability 0, space 0, times 0 [ 186.722247][T10554] CPU: 1 PID: 10554 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 [ 186.730981][T10554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.741041][T10554] Call Trace: [ 186.744339][T10554] dump_stack+0x1e9/0x30e [ 186.748683][T10554] should_fail+0x433/0x5b0 [ 186.753114][T10554] should_failslab+0x5/0x20 [ 186.757632][T10554] kmem_cache_alloc_node+0x64/0x290 [ 186.762844][T10554] ? __alloc_skb+0x94/0x4f0 [ 186.767362][T10554] __alloc_skb+0x94/0x4f0 [ 186.771738][T10554] __ip_append_data+0x2174/0x33b0 [ 186.776808][T10554] ? do_raw_getsockopt+0x1b0/0x1b0 [ 186.781919][T10554] ? ipv4_mtu+0x2cb/0x3c0 [ 186.786251][T10554] ? ip_setup_cork+0x476/0x820 [ 186.791031][T10554] ip_append_data+0x12c/0x1a0 [ 186.795726][T10554] ? do_raw_getsockopt+0x1b0/0x1b0 [ 186.800836][T10554] raw_sendmsg+0x1cfa/0x35e0 [ 186.805470][T10554] ? sock_rps_record_flow+0x1c/0x370 [ 186.810768][T10554] ? inet_sendmsg+0x80/0x310 [ 186.815371][T10554] ? inet_send_prepare+0x250/0x250 [ 186.820472][T10554] kernel_sendmsg+0xe2/0x120 [ 186.825065][T10554] sock_no_sendpage+0xe0/0x120 [ 186.829861][T10554] ? inet_sendmsg+0x310/0x310 [ 186.834559][T10554] sock_sendpage+0xd0/0x120 [ 186.839118][T10554] pipe_to_sendpage+0x208/0x2d0 [ 186.843989][T10554] ? sock_fasync+0xf0/0xf0 [ 186.848460][T10554] __splice_from_pipe+0x329/0x870 [ 186.853525][T10554] ? generic_splice_sendpage+0x180/0x180 [ 186.859173][T10554] generic_splice_sendpage+0x112/0x180 [ 186.864638][T10554] ? rw_verify_area+0x170/0x340 [ 186.869537][T10554] ? iter_file_splice_write+0xe20/0xe20 [ 186.875093][T10554] __se_sys_splice+0x7e4/0x1ad0 [ 186.879962][T10554] ? ksys_write+0x1ab/0x220 [ 186.884491][T10554] ? check_preemption_disabled+0xb0/0x240 [ 186.890217][T10554] ? debug_smp_processor_id+0x5/0x20 [ 186.895524][T10554] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 186.901241][T10554] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 186.907323][T10554] do_syscall_64+0xf3/0x1b0 [ 186.911845][T10554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.917740][T10554] RIP: 0033:0x45c849 [ 186.921628][T10554] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.941235][T10554] RSP: 002b:00007f3ff13b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 186.949777][T10554] RAX: ffffffffffffffda RBX: 00007f3ff13b86d4 RCX: 000000000045c849 [ 186.957911][T10554] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 186.965895][T10554] RBP: 000000000076bf00 R08: 000000007ffffffe R09: 0000000000000004 [ 186.973881][T10554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 186.981861][T10554] R13: 0000000000000ba2 R14: 00000000004ce68a R15: 0000000000000001 10:39:10 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 187.015215][ T312] tipc: TX() has been purged, node left! [ 187.175613][ T312] tipc: TX() has been purged, node left! [ 187.344986][ T312] tipc: TX() has been purged, node left! [ 187.485001][ T312] tipc: TX() has been purged, node left! [ 187.644978][ T312] tipc: TX() has been purged, node left! [ 187.825129][ T312] tipc: TX() has been purged, node left! [ 188.005225][ T312] tipc: TX() has been purged, node left! [ 188.165918][ T312] tipc: TX() has been purged, node left! [ 188.315020][ T312] tipc: TX() has been purged, node left! [ 188.465008][ T312] tipc: TX() has been purged, node left! [ 188.645075][ T312] tipc: TX() has been purged, node left! [ 188.805408][ T312] tipc: TX() has been purged, node left! [ 188.964988][ T312] tipc: TX() has been purged, node left! 10:39:13 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={0x0, r3}, 0x10) 10:39:13 executing program 0 (fault-call:8 fault-nth:2): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:13 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@discard='discard'}, {@largeio='largeio'}]}) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r2 = socket$netlink(0x10, 0x3, 0xf) r3 = socket(0x400000000010, 0x3, 0x0) write(r3, &(0x7f0000000280)="2400000020002551075c0165ff0ffc020a00000000100f0007e1000c080017001600f000", 0x24) r4 = socket(0x400000000010, 0x3, 0x0) write(r4, &(0x7f0000000280)="2400000020002551075c0165ff0ffc020a00000000100f0007e1000c080017001600f000", 0x24) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x4c, r1, 0x8, 0x7, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8, 0x1, r4}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x4489c) accept4(r0, &(0x7f0000003ac0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000003b40)=0x80, 0x0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000003b80)='/proc/capi/capi20ncci\x00', 0x84800, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000003c80)={&(0x7f0000000100), 0xc, &(0x7f0000003c40)={&(0x7f0000003bc0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000027bd7000fddbdf25050000004c00078008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="1800e3ff", @ANYRES32=r9, @ANYBLOB="0c00080007000000000000000c000300f95c000000000000"], 0x78}, 0x1, 0x0, 0x0, 0x20040805}, 0x80) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 189.104992][ T312] tipc: TX() has been purged, node left! 10:39:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00'}, 0xd) [ 189.188954][T10586] FAULT_INJECTION: forcing a failure. [ 189.188954][T10586] name failslab, interval 1, probability 0, space 0, times 0 10:39:13 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 189.265524][T10584] IPVS: ftp: loaded support on port[0] = 21 [ 189.305454][ T312] tipc: TX() has been purged, node left! [ 189.305832][T10586] CPU: 0 PID: 10586 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 [ 189.319901][T10586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.330067][T10586] Call Trace: [ 189.333380][T10586] dump_stack+0x1e9/0x30e [ 189.337727][T10586] should_fail+0x433/0x5b0 [ 189.342172][T10586] should_failslab+0x5/0x20 [ 189.346685][T10586] kmem_cache_alloc_node_trace+0x69/0x2b0 [ 189.348220][T10589] XFS (loop1): Invalid superblock magic number [ 189.352524][T10586] ? __kmalloc_node_track_caller+0x37/0x60 [ 189.352541][T10586] __kmalloc_node_track_caller+0x37/0x60 [ 189.352551][T10586] ? __ip_append_data+0x2174/0x33b0 [ 189.352565][T10586] __alloc_skb+0xde/0x4f0 [ 189.352586][T10586] __ip_append_data+0x2174/0x33b0 [ 189.384899][T10586] ? do_raw_getsockopt+0x1b0/0x1b0 [ 189.390036][T10586] ? ipv4_mtu+0x2cb/0x3c0 [ 189.394377][T10586] ? ip_setup_cork+0x476/0x820 [ 189.399154][T10586] ip_append_data+0x12c/0x1a0 [ 189.403847][T10586] ? do_raw_getsockopt+0x1b0/0x1b0 [ 189.408970][T10586] raw_sendmsg+0x1cfa/0x35e0 [ 189.413611][T10586] ? sock_rps_record_flow+0x1c/0x370 [ 189.418940][T10586] ? inet_sendmsg+0x80/0x310 [ 189.423828][T10586] ? inet_send_prepare+0x250/0x250 [ 189.428973][T10586] kernel_sendmsg+0xe2/0x120 [ 189.433595][T10586] sock_no_sendpage+0xe0/0x120 [ 189.438390][T10586] ? inet_sendmsg+0x310/0x310 [ 189.443082][T10586] sock_sendpage+0xd0/0x120 [ 189.447638][T10586] pipe_to_sendpage+0x208/0x2d0 [ 189.452493][T10586] ? sock_fasync+0xf0/0xf0 [ 189.456924][T10586] __splice_from_pipe+0x329/0x870 [ 189.461990][T10586] ? generic_splice_sendpage+0x180/0x180 [ 189.467641][T10586] generic_splice_sendpage+0x112/0x180 [ 189.473261][T10586] ? rw_verify_area+0x170/0x340 [ 189.478130][T10586] ? iter_file_splice_write+0xe20/0xe20 [ 189.483686][T10586] __se_sys_splice+0x7e4/0x1ad0 [ 189.488567][T10586] ? ksys_write+0x1ab/0x220 [ 189.493097][T10586] ? check_preemption_disabled+0xb0/0x240 [ 189.498820][T10586] ? debug_smp_processor_id+0x5/0x20 [ 189.504243][T10586] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 189.509969][T10586] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 10:39:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00'}, 0xd) [ 189.516148][T10586] do_syscall_64+0xf3/0x1b0 [ 189.520673][T10586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.526568][T10586] RIP: 0033:0x45c849 [ 189.530459][T10586] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.550074][T10586] RSP: 002b:00007f3ff13b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 189.558498][T10586] RAX: ffffffffffffffda RBX: 00007f3ff13b86d4 RCX: 000000000045c849 [ 189.566482][T10586] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 189.574461][T10586] RBP: 000000000076bf00 R08: 000000007ffffffe R09: 0000000000000004 [ 189.582553][T10586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 189.590530][T10586] R13: 0000000000000ba2 R14: 00000000004ce68a R15: 0000000000000002 10:39:13 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00'}, 0xd) [ 189.747993][T10633] IPVS: ftp: loaded support on port[0] = 21 [ 189.755712][ T312] tipc: TX() has been purged, node left! 10:39:13 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 189.864790][T10645] FAULT_INJECTION: forcing a failure. [ 189.864790][T10645] name failslab, interval 1, probability 0, space 0, times 0 [ 189.925148][ T312] tipc: TX() has been purged, node left! [ 189.931781][ T312] tipc: TX() has been purged, node left! [ 189.951477][T10645] CPU: 1 PID: 10645 Comm: syz-executor.5 Not tainted 5.6.0-rc7-syzkaller #0 [ 189.960340][T10645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.970425][T10645] Call Trace: [ 189.973731][T10645] dump_stack+0x1e9/0x30e [ 189.978090][T10645] should_fail+0x433/0x5b0 [ 189.982535][T10645] ? __se_sys_memfd_create+0xfb/0x480 [ 189.987922][T10645] should_failslab+0x5/0x20 [ 189.992629][T10645] __kmalloc+0x74/0x330 [ 189.996798][T10645] ? strnlen_user+0x206/0x2c0 [ 190.001498][T10645] __se_sys_memfd_create+0xfb/0x480 [ 190.006729][T10645] do_syscall_64+0xf3/0x1b0 [ 190.011256][T10645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.017279][T10645] RIP: 0033:0x45c849 [ 190.021182][T10645] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.040914][T10645] RSP: 002b:00007f33f9acaa68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 190.049343][T10645] RAX: ffffffffffffffda RBX: 00007f33f9acb6d4 RCX: 000000000045c849 [ 190.057379][T10645] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 190.065371][T10645] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 190.073384][T10645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 190.081424][T10645] R13: 0000000000000bd7 R14: 00000000004cdf36 R15: 0000000000000000 10:39:14 executing program 3 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:14 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) [ 190.118139][T10589] XFS (loop1): Invalid superblock magic number 10:39:14 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 190.190761][T10673] FAULT_INJECTION: forcing a failure. [ 190.190761][T10673] name failslab, interval 1, probability 0, space 0, times 0 [ 190.212278][T10673] CPU: 1 PID: 10673 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 190.221373][T10673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.231612][T10673] Call Trace: [ 190.234922][T10673] dump_stack+0x1e9/0x30e [ 190.239277][T10673] should_fail+0x433/0x5b0 [ 190.243721][T10673] ? getname_flags+0xb8/0x610 [ 190.248415][T10673] should_failslab+0x5/0x20 [ 190.252930][T10673] kmem_cache_alloc+0x53/0x2d0 [ 190.257716][T10673] getname_flags+0xb8/0x610 [ 190.262253][T10673] ? fput_many+0x42/0x1a0 [ 190.266629][T10673] user_path_create+0x22/0x40 [ 190.271326][T10673] bpf_obj_pin_user+0x65/0x240 [ 190.276114][T10673] __do_sys_bpf+0x15d3/0xc1f0 [ 190.280816][T10673] ? rcu_lock_release+0x5/0x20 [ 190.285609][T10673] ? proc_fail_nth_write+0x167/0x1d0 [ 190.290928][T10673] ? ksys_write+0x1ab/0x220 [ 190.295445][T10673] ? ksys_write+0x1ab/0x220 [ 190.299969][T10673] ? check_preemption_disabled+0xb0/0x240 [ 190.305698][T10673] ? debug_smp_processor_id+0x5/0x20 [ 190.310998][T10673] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 190.316732][T10673] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 190.322819][T10673] ? do_syscall_64+0x19/0x1b0 [ 190.327518][T10673] do_syscall_64+0xf3/0x1b0 [ 190.332070][T10673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.338107][T10673] RIP: 0033:0x45c849 [ 190.342011][T10673] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.362317][T10673] RSP: 002b:00007ff58c47dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 190.370745][T10673] RAX: ffffffffffffffda RBX: 00007ff58c47e6d4 RCX: 000000000045c849 [ 190.378731][T10673] RDX: 000000000000000d RSI: 00000000200004c0 RDI: 0000000000000006 10:39:14 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) [ 190.386727][T10673] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 190.394708][T10673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 190.402695][T10673] R13: 0000000000000066 R14: 00000000004c3078 R15: 0000000000000000 10:39:14 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) [ 190.475104][ T312] tipc: TX() has been purged, node left! 10:39:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$DRM_IOCTL_MODE_GETFB(r2, 0xc01c64ad, &(0x7f00000000c0)={0x49bd, 0x1f, 0x832, 0x431, 0x7, 0x7, 0xe1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d20680648c63940d0424fc60040012400a0016000a3582c137153e370907118000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:39:14 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0xf) 10:39:14 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:14 executing program 3 (fault-call:6 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:14 executing program 2: unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) [ 190.645148][ T312] tipc: TX() has been purged, node left! [ 190.683071][T10695] IPVS: ftp: loaded support on port[0] = 21 [ 190.733874][T10702] FAULT_INJECTION: forcing a failure. [ 190.733874][T10702] name failslab, interval 1, probability 0, space 0, times 0 [ 190.740553][T10700] netlink: 16638 bytes leftover after parsing attributes in process `syz-executor.1'. [ 190.785925][T10698] FAULT_INJECTION: forcing a failure. [ 190.785925][T10698] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 190.800384][T10698] CPU: 1 PID: 10698 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 190.809090][T10698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.819193][T10698] Call Trace: [ 190.822507][T10698] dump_stack+0x1e9/0x30e [ 190.826860][T10698] should_fail+0x433/0x5b0 [ 190.831306][T10698] prepare_alloc_pages+0x28c/0x4a0 [ 190.836444][T10698] __alloc_pages_nodemask+0xbf/0x600 [ 190.841765][T10698] kmem_getpages+0x49/0x930 [ 190.846296][T10698] cache_grow_begin+0x7b/0x2e0 [ 190.851080][T10698] cache_alloc_refill+0x346/0x3e0 [ 190.856115][T10698] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 190.861849][T10698] ? check_preemption_disabled+0xb0/0x240 [ 190.867578][T10698] ? debug_smp_processor_id+0x5/0x20 [ 190.872878][T10698] ? getname_flags+0xb8/0x610 [ 190.877575][T10698] kmem_cache_alloc+0x2b5/0x2d0 [ 190.877598][T10698] getname_flags+0xb8/0x610 [ 190.877612][T10698] ? fput_many+0x42/0x1a0 [ 190.877628][T10698] user_path_create+0x22/0x40 [ 190.877646][T10698] bpf_obj_pin_user+0x65/0x240 [ 190.877666][T10698] __do_sys_bpf+0x15d3/0xc1f0 [ 190.896612][T10709] netlink: 16638 bytes leftover after parsing attributes in process `syz-executor.1'. [ 190.901011][T10698] ? rcu_lock_release+0x5/0x20 [ 190.901038][T10698] ? proc_fail_nth_write+0x167/0x1d0 [ 190.901071][T10698] ? ksys_write+0x1ab/0x220 [ 190.929867][T10698] ? ksys_write+0x1ab/0x220 [ 190.934402][T10698] ? check_preemption_disabled+0xb0/0x240 [ 190.940135][T10698] ? debug_smp_processor_id+0x5/0x20 [ 190.945573][T10698] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 190.951305][T10698] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 190.957391][T10698] ? do_syscall_64+0x19/0x1b0 [ 190.962234][T10698] do_syscall_64+0xf3/0x1b0 [ 190.966799][T10698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.972704][T10698] RIP: 0033:0x45c849 [ 190.976602][T10698] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.976609][T10698] RSP: 002b:00007ff58c47dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 190.976619][T10698] RAX: ffffffffffffffda RBX: 00007ff58c47e6d4 RCX: 000000000045c849 [ 190.976625][T10698] RDX: 000000000000000d RSI: 00000000200004c0 RDI: 0000000000000006 [ 190.976631][T10698] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 190.976636][T10698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 10:39:14 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f0000000080)=0x68f5) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 190.976643][T10698] R13: 0000000000000066 R14: 00000000004c3078 R15: 0000000000000001 [ 191.083492][T10702] CPU: 1 PID: 10702 Comm: syz-executor.5 Not tainted 5.6.0-rc7-syzkaller #0 [ 191.092212][T10702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.102302][T10702] Call Trace: [ 191.105602][T10702] dump_stack+0x1e9/0x30e [ 191.109958][T10702] should_fail+0x433/0x5b0 [ 191.114505][T10702] ? shmem_alloc_inode+0x17/0x40 [ 191.119450][T10702] should_failslab+0x5/0x20 [ 191.123963][T10702] kmem_cache_alloc+0x53/0x2d0 [ 191.128745][T10702] ? shmem_match+0x150/0x150 [ 191.133358][T10702] shmem_alloc_inode+0x17/0x40 [ 191.138133][T10702] ? shmem_match+0x150/0x150 [ 191.142733][T10702] new_inode_pseudo+0x64/0x240 [ 191.148115][T10702] new_inode+0x25/0x1d0 [ 191.152290][T10702] shmem_get_inode+0x10e/0x6f0 [ 191.157068][T10702] ? __alloc_fd+0x566/0x600 [ 191.161590][T10702] __shmem_file_setup+0x11e/0x270 [ 191.166638][T10702] __se_sys_memfd_create+0x25e/0x480 [ 191.171943][T10702] do_syscall_64+0xf3/0x1b0 [ 191.176460][T10702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.183141][T10702] RIP: 0033:0x45c849 [ 191.187043][T10702] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.206663][T10702] RSP: 002b:00007f33f9acaa68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 191.215087][T10702] RAX: ffffffffffffffda RBX: 00007f33f9acb6d4 RCX: 000000000045c849 [ 191.223072][T10702] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 10:39:15 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$inet(0x2, 0x3, 0x1) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x440, 0x0) ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000100)) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7ffffffe, 0x4) [ 191.231055][T10702] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 191.239039][T10702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 191.247059][T10702] R13: 0000000000000bd7 R14: 00000000004cdf36 R15: 0000000000000001 10:39:15 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='ip6tnl0\x00', 0x10) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setresgid(0xee00, 0x0, r6) write$P9_RGETATTR(r3, &(0x7f0000000100)={0xa0, 0x19, 0x2, {0x81, {0x2, 0x3, 0x1}, 0x80, r5, r6, 0x7fffffff, 0x4787, 0x27ea, 0x7, 0x6, 0x100, 0x400, 0x1ff, 0x4, 0x5, 0x9, 0x0, 0x9, 0x40, 0x4}}, 0xa0) r7 = fcntl$dupfd(r2, 0x0, r1) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000d, 0xb, 0x10000000000}) write$binfmt_misc(r8, &(0x7f0000000080)=ANY=[], 0x0) splice(r0, 0x0, r1, 0x0, 0x7ffffffe, 0x4) 10:39:15 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'geneve0\x00'}}, 0x1e) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000000c0)={0x18, 0x0, {0x3, @dev, 'vcan0\x00'}}, 0x1e) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb9c00a480e180f000000e8bd6efb120015000e000100400000ff050005001200", 0x2e}], 0x1}, 0x4008085) 10:39:15 executing program 2: unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$9p(r1, &(0x7f00000000c0)="cd0faee3f447d7a33cd859d95705d93e952b501cad4c439a4ccb8dad1f3ddfffe3b78185d73784db57181c9a7da7e7315056634a6c4f8923398aa8f15168e8c7285b1697152d400c5c516eef3a9e48130523524db01f174ea44184cf6e8aa55e21ee6daa248bab8916edda6d072a0c072ae85fbbaba4cf9630dc030cc649194c42a37a0d4b4e590b6e69506483de6a3ede00dfd12d25fbec972eaaa6481b361d4cf072b3b6a94e6936", 0xa9) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000001031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)=""/95, &(0x7f0000000080)=0x5f) [ 191.648574][T10748] IPVS: ftp: loaded support on port[0] = 21 10:39:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) clock_gettime(0x0, &(0x7f0000002e00)) recvmmsg(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x62, 0x0, 0x0, &(0x7f00000002c0)=""/148, 0x94}, 0x8}, {{0x0, 0x0, 0x0}, 0x90}, {{&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000440)=""/213}, {&(0x7f0000000000)=""/29}, {&(0x7f00000005c0)=""/174}, {&(0x7f0000000780)=""/210}, {&(0x7f0000000680)=""/154}, {&(0x7f0000000880)=""/124}, {&(0x7f0000000140)=""/40}, {&(0x7f0000000900)=""/203}], 0x0, &(0x7f0000000240)=""/24}, 0xfffffffc}, {{&(0x7f0000000a80)=@ethernet={0x0, @link_local}, 0x0, &(0x7f0000002d40)=[{&(0x7f0000000b00)=""/232}, {&(0x7f0000000c00)=""/4096}, {&(0x7f0000001c00)=""/43}, {&(0x7f0000001c40)=""/4096}, {&(0x7f0000002c40)=""/68}, {&(0x7f0000002cc0)=""/67}, {&(0x7f0000002e40)=""/223}, {&(0x7f0000002f40)=""/208}], 0x0, &(0x7f0000002dc0)=""/51}, 0x1}], 0x3, 0x10020, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000080)={0x3, 'ip6tnl0\x00', {0x7fff}, 0x3}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='usrjquota=y']) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f0000000740)={0x7, 'bridge_slave_1\x00', {0x4}, 0x7fff}) getsockname$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x50}}, 0x0) 10:39:15 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:15 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:15 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x2, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 192.027812][T10786] REISERFS warning (device loop1): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 192.049221][T10776] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 10:39:16 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x3, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 192.305997][T10814] REISERFS warning (device loop1): super-6515 reiserfs_parse_options: journaled quota format not specified. 10:39:16 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) getuid() r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:16 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 192.369243][T10781] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 10:39:16 executing program 2: unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:16 executing program 1: syz_emit_ethernet(0xd2, &(0x7f0000000140)={@link_local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "c31a46", 0x9c, 0x11, 0x0, @local, @local, {[], {0x0, 0x17c1, 0x9c, 0x0, @wg=@initiation={0x1, 0x4, "0aef572b70612742eef692ee37b32a7b2f4d70bc5dc4f0420bd1e8e0fddd9e96", "3db45dfc2363e859344275573e26de8f577314b202cc2c2a7ce229b7fca97d0648f25ab64bbb551659f6f57c9a88cd1c", "122b6f4c200c94aa3da967a041518fd521c1bb705f2a7eb951bd95df", {"91a5608d1a2e75a32a7ab48904c3ae5e", "0e5a57516041e340ab957ac94acb5016"}}}}}}}}, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) 10:39:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x4, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:16 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:16 executing program 0: pipe(&(0x7f0000002300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = add_key$user(&(0x7f0000002180)='user\x00', &(0x7f0000002200)={'syz', 0x2}, &(0x7f0000002240)="aa6e263247860ccd2dcd2e6d10636d58a899d1618086252f7f1ea9e8fd87a55609b98f263e5af93d69494768e999c2caa03b5d87", 0x34, 0xfffffffffffffffd) keyctl$read(0xb, r5, &(0x7f0000002280)=""/94, 0x5e) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$KVM_SET_NESTED_STATE(r6, 0x4080aebf, &(0x7f0000000100)={{0x0, 0x0, 0x80, {0x100000, 0x5000, 0x2}}, "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", "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"}) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$bt_hci_HCI_DATA_DIR(r7, 0x0, 0x1, &(0x7f00000021c0), 0x4) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r9 = open(&(0x7f0000000000)='./file1\x00', 0x0, 0x4) ioctl$FITRIM(r9, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) splice(r4, 0x0, r0, 0x0, 0x7ffffffe, 0x4) 10:39:16 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x8) [ 192.712892][T10842] IPVS: ftp: loaded support on port[0] = 21 10:39:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x5, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:16 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000080)={0x101, 0x2, 0xf, 0x0, 0x0, 0xfff, 0x0, 0xfff, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000140)={r7, 0x5}, &(0x7f0000000180)=0x8) 10:39:16 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:16 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x8, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:17 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x9, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:17 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:17 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_inet6_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000080)) r6 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_inet_SIOCGIFNETMASK(r6, 0x891b, &(0x7f0000000100)={'sit0\x00', {0x2, 0x4e20, @empty}}) [ 193.590451][T10918] IPVS: ftp: loaded support on port[0] = 21 10:39:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0xa, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:17 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:17 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0x200b}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x341800, 0x0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r7 = fcntl$dupfd(r5, 0x406, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0xb, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:17 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:18 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='errors=continue']) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0xc, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:18 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000200), &(0x7f0000000240)=0xc) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="01000000000000000000480000000800031579d2aafc2530f496dc13e052d9e7f664a54e2c7dd534bb02570782b471a07c81212a748a52df272e5c6c9c314e3b7a465c9462ee4e407e2bfdcbf0c09f793baa1f9a0d0a7f2b176e9dc17758401bb9536897c643c171a363c0", @ANYRES32=0x0, @ANYBLOB="a7dc8fa5df8924297905e4d167456f1ff706f68533fd40d21b0b2a974d6d9414c88f59e5af5e0283bef67dffc49219267410c954b5532b6c5456"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xe4, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x90, 0xbe, "390be28c4933d474729b3655b5a76c8d6056be41dce5393564cb18c6f4757605e9577484e045badfa533fc302e0761d0997c4b9668115c5ba30d7c4f3848737db9e6df5c7bb7b2a3544d3e49e3087a6f404674163ffc08d8854eeaa8792a662ba3563ec5453dc1744bda57378cd50cdcb8a1475843300a2b910b474a992218892e2e22c1cd29aa5628316466"}, @NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x3}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x582}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xb, 0xbe, "cedf0fc293bbd0"}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x5}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xc, 0xbd, [0x200, 0x3f, 0x3, 0x7fff]}]}, 0xe4}}, 0x0) [ 194.195653][T10985] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 10:39:18 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:18 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f00000001c0)=0x8b) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000080)) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x16a) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = syz_open_pts(r4, 0x40041) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000180)={0x0, 0x1, 0x51, 0xfffffff7, 0x1, "61673f7e247bbc631f4e5ce8c02bf61660e845"}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = fcntl$dupfd(r3, 0x0, r2) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x2, 0xb, 0xfffffffffffffffe}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)=""/74, 0x4a}, {&(0x7f00000002c0)=""/10, 0xa}, {&(0x7f0000000300)=""/178, 0xb2}, {&(0x7f00000003c0)=""/209, 0xd1}, {&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f0000000540)}, {&(0x7f0000000580)=""/98, 0x62}, {&(0x7f0000000600)=""/4, 0x4}], 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000140)=0x8) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:18 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:18 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x200, 0x4) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x2000) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000040)={0x3, @default, r3}) 10:39:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0xd, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 194.496130][T11007] IPVS: ftp: loaded support on port[0] = 21 10:39:18 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) ioctl$SIOCAX25GETUID(r5, 0x89e0, &(0x7f00000001c0)={0x3, @null, r6}) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0xe, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:18 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0xf, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:18 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0xa6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) open_by_handle_at(r5, &(0x7f0000000100)={0xc4, 0x3, "5e6e172347a05ebef434deaa7f3e236aa5a93eb3700a9a3d92665b6ee60869408e58f958902c297ee58cbe714d5a5dd51f98fa2621040dd65dcd40e8c304578be9899ed6ec70c5cf0bb799d5690042ec6b76bd9ddd970deea17d00e76cb7f2e01c226c472411a4583a0ee8f2d659b90eaf778745a07ac4a010ca5462bbf2233670ca156f5c1afe221da2d53573680d67368ac8cfafcbc78824be69eab4f77beb568fb6d31a1ed182699894e0a83bdeed2c530cc8a29e5782d37effcc"}, 0x4040) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:18 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x10, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:19 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:19 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x11, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 195.429094][T11088] IPVS: ftp: loaded support on port[0] = 21 10:39:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x12, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:19 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r2 = socket(0x11, 0x3, 0x0) bind$packet(r2, &(0x7f00000000c0), 0x14) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2, 0x0) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r4) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000200)={r6, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000180)={r6, 0x44, "f00fda4e008485029d460c04049608e2b1654d7919e1a87ca1782bb964dc8bb72772cb5ee06a89731d865e45f943a073edf81e5a7625a15cc029701eb17e070fea3b3b31"}, &(0x7f0000000280)=0x4c) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000000)={0x3, 0x4}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001e00010000f9ff000000000007000000", @ANYRES32=r8, @ANYBLOB="000000000a000200ffffffffffff0000"], 0x28}}, 0x0) r9 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r9, &(0x7f0000000140), 0xd3, 0x0) 10:39:19 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x13, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x37]}}]}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) mknodat(r3, &(0x7f0000000040)='./bus\x00', 0x8, 0x5) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x48280) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) io_uring_setup(0x0, &(0x7f00000000c0)) read(r4, &(0x7f0000000180)=""/19, 0xfffffe47) 10:39:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x14, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:20 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x15, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3020}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x9) prctl$PR_CAPBSET_DROP(0x18, 0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x16, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:20 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x17, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3020}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x9) prctl$PR_CAPBSET_DROP(0x18, 0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:20 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r4 = shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(r4, 0x0) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000100)=""/167) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7ffffffe, 0x4) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCGISO7816(r5, 0x80285442, &(0x7f0000000080)) close(0xffffffffffffffff) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={r7, @in6={{0xa, 0x0, 0x0, @remote}}, [0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)={r7, 0x1f, 0xb9, "8a16729f316e08ac8d9b5d139ce2775b0f0b0823e96abe5c4533466b4ddfc87fedbf3155e29a419c49656c0079777ba7cc3a960cc6d18b88b672a9bc65832b961e5680bf142bb6a2669c97d5d8a0bbd9e143ac7aaaef0e1cee35221bfdaeb4a1fcbd2794856d674ac93db2122453b22bb880ebf1f1b0919b40e9502db9101028176a9906c41bbf37fbd2cfec7844c6d68ef891a1ef30630d098bf4d0910ed370ebecc423645eabc64bb2f1dda648ecaa6c04969180b5aeb728"}, 0xc1) 10:39:20 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x5c, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x18, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 196.567975][T11211] IPVS: ftp: loaded support on port[0] = 21 10:39:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3020}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x9) prctl$PR_CAPBSET_DROP(0x18, 0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3020}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x9) prctl$PR_CAPBSET_DROP(0x18, 0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:20 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@remote, r7}, 0x14) r8 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r9 = fcntl$dupfd(r8, 0x0, r2) connect$inet(r9, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@sha1={0x1, "21892681c65623154d7a160c48f9cd66dc759f47"}, 0x15, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:20 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x19, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3020}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x9) prctl$PR_CAPBSET_DROP(0x18, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) [ 196.863910][T11255] device bridge1 entered promiscuous mode 10:39:20 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000040)={'team_slave_1\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x1412, 0x1, 0x70bd26, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x880}, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) connect$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r3, 0x0, 0x7ffffffe, 0x4) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r7 = socket$inet_sctp(0x2, 0x1, 0x84) fsync(r7) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) fsconfig$FSCONFIG_SET_PATH(r6, 0x3, &(0x7f0000000200)='team_slave_1\x00', &(0x7f0000000240)='./file0\x00', r8) [ 196.949509][T11265] IPVS: ftp: loaded support on port[0] = 21 10:39:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3020}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x9) prctl$PR_CAPBSET_DROP(0x18, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x1a, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:21 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:21 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) recvmsg$can_j1939(r5, &(0x7f00000003c0)={&(0x7f0000000100)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/149, 0x95}, {&(0x7f0000000240)=""/181, 0xb5}, {&(0x7f0000000080)=""/26, 0x1a}], 0x3, &(0x7f0000000340)=""/103, 0x67}, 0x10120) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3020}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x9) prctl$PR_CAPBSET_DROP(0x18, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x1b, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:21 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3020}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x9) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:21 executing program 0: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$int_out(r5, 0x5462, &(0x7f0000000140)) r6 = fcntl$dupfd(r4, 0x0, r3) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x7ffffffe, 0x4) 10:39:21 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 197.373731][T11325] IPVS: ftp: loaded support on port[0] = 21 10:39:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3020}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:21 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$P9_RCREATE(r3, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x8, 0x3, 0x6}, 0x8001}}, 0x18) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000100)={0x6, 0xb, 0x4, 0x4, 0x1, {0x77359400}, {0x11302d64c5c8aa78, 0x1, 0x81, 0x2, 0x0, 0x3a, "6dd20e70"}, 0x3f, 0x2, @fd=r3, 0x40, 0x0, r4}) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = fcntl$dupfd(r5, 0x0, r2) r7 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x14) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) fcntl$dupfd(r1, 0x0, r7) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) open(&(0x7f0000000180)='./file0/file0\x00', 0x10000, 0x0) 10:39:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x2}, 0xd) 10:39:21 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:21 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:21 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:21 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') ioctl$KVM_GET_PIT(r4, 0xc048ae65, &(0x7f0000000100)) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r6, 0xc10c5541, &(0x7f0000000180)={0x1000, 0x400}) r7 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 197.738508][T11379] IPVS: ftp: loaded support on port[0] = 21 10:39:21 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:21 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x3}, 0xd) 10:39:21 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:21 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x40, 0x0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r7 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000100)={0x1, 0x8, 0x4, 0x0, 0x3, {0x77359400}, {0x5, 0x2, 0xef, 0x1, 0x4, 0x5, "14523e9e"}, 0x7f, 0x2, @fd=r6, 0x1, 0x0, r7}) 10:39:21 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:21 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x4}, 0xd) [ 198.046993][T11425] IPVS: ftp: loaded support on port[0] = 21 10:39:22 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:22 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:22 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x5}, 0xd) 10:39:22 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:22 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f0000000080)) 10:39:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:22 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 198.380896][T11486] IPVS: ftp: loaded support on port[0] = 21 10:39:22 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x6}, 0xd) 10:39:22 executing program 0: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000140)={0x3, 0x1, [{0x1, 0x0, 0xebe}, {0x6, 0x0, 0x8}, {0x1, 0x0, 0xb2}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x3) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0xc203, 0x0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) splice(r5, 0x0, r2, 0x0, 0x1ff, 0xd) 10:39:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:22 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x7}, 0xd) [ 198.639692][T11517] IPVS: ftp: loaded support on port[0] = 21 10:39:22 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x11000000, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_UPDELAY={0x8, 0x1b}, @IFLA_BOND_MODE={0x5, 0x1, 0x6}]}}}]}, 0x44}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = fcntl$dupfd(r4, 0x0, r3) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r3, 0x0, 0x7ffffffe, 0x2) 10:39:22 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:22 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x8}, 0xd) [ 198.900145][T11552] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 10:39:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:22 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) [ 199.018732][T11552] 8021q: adding VLAN 0 to HW filter on device bond1 [ 199.039418][T11604] IPVS: ftp: loaded support on port[0] = 21 10:39:23 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0}}], 0x2, 0x0) 10:39:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x9}, 0xd) 10:39:23 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x406, r2) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r5) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={r5, 0xb5, 0x7d}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'crc32c-intel\x00'}}, &(0x7f0000000180)="a0fb4ff62b28867af5bd570025bc07cbbb5e6c2a9b209fabf654d24d7635b37e729913d383cb94621a83208e3c88f574b7c9b5dfba9a418a7d29a761e08151cdc42f213d9c3e8e78f858ab0258575d28e3f0a6a1b46458f55486c2f23235395c820dde3fc1b61e68d3bbe438d0be1cd037a69044482771e0f0e691c5f5bd0cf99cfb8a173383575c0b527bdcfca21e66b6bdd2465d1c03905007ae958558039f97c750e06d2b71472ea3db93e871b775f5d79c4006", &(0x7f0000000240)=""/125) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:23 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:23 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) 10:39:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xa}, 0xd) 10:39:23 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:23 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x4000001) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) bind$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000100)=ANY=[@ANYBLOB="090000000900ce0b0500020000010700000000000000"], &(0x7f0000000140)=0x16) fcntl$dupfd(r3, 0x0, r2) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x28) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0x1, 0x8000000}) sendmsg$NFQNL_MSG_CONFIG(r5, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x2, 0x3, 0x0, 0x0, 0x0, {}, [@NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x28}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x7}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x10c0}, 0x8000) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_SIOCADDDLCI(r6, 0x8980, &(0x7f0000000180)={'veth0_to_team\x00', 0x8}) 10:39:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:23 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) 10:39:23 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x40, 0x8001}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={r3, 0x97, 0x5, 0x400}, &(0x7f0000000180)=0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0xa, 0xa) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = fcntl$dupfd(r5, 0x0, r4) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r4, 0x0, 0x7ffffffe, 0x4) [ 199.547792][T11664] IPVS: ftp: loaded support on port[0] = 21 10:39:23 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x1100, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:23 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) [ 199.631426][T11676] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 10:39:23 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2, 0x0) 10:39:23 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 10:39:23 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x1200, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:23 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 10:39:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xb}, 0xd) 10:39:23 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 10:39:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:23 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r6) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r7) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r8) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r10 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r9) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r10) write$binfmt_misc(r1, &(0x7f00000011c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="85e7519de4d3c69ecfd005522aa754a6a468a50ce1add522bbf0dd48e6807f6f965efd7e0f219728eef085c61447dbbc6e31b62c9851172a2d38d720e5ddeabec0022ce1b198f357b9e711ee6d9e4b977549aea39c449a1217db20a094", @ANYBLOB="2beefc5e2b137fa97b3a1da59317074087ea2a0007933e0b5d3c98c399ce287247d270c373ddb925bd6b45cb83fe24433a7ddc00095dc38cf32aa67779d3d1456b1d8be2eac91df821a19e57", @ANYRES16=r6, @ANYRES16=r8, @ANYRES64=r10, @ANYRES16=r1, @ANYBLOB="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", @ANYRES16]], 0x8) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:23 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 10:39:23 executing program 4: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x401, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000200)={r4, @in6={{0xa, 0x0, 0x0, @remote}}, [0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=r4, @ANYBLOB="3cffffffff00"], &(0x7f0000000040)=0xa) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/379], 0x10094) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0xfffffffffffffff9, 0x40) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000180), 0x4) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x8001}) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000400)={r6}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080), 0xc) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="97f5bf291c747f"], 0x19f28) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:39:24 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xc}, 0xd) [ 200.138709][T11734] IPVS: ftp: loaded support on port[0] = 21 10:39:24 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 10:39:24 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:24 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 10:39:24 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:24 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) connect$pptp(r4, &(0x7f0000000180)={0x18, 0x2, {0x0, @local}}, 0x1e) r5 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xb, 0xe01, 0xfffffff8, 0xffff, 0x8, 0xffffffffffffffff, 0x4, [], r6, r0, 0x1, 0x4}, 0x40) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) fsetxattr$trusted_overlay_upper(r7, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x70, 0x7, 0x7, "5d471017baaccfc2493c2661b6202614", "62d40dec9e15154706aae59724caa574a7fa9686beb9e14013d31b80cb668648cdb0b778edcb739bb6e67cfdea484fcb1c71025c97a43763f06e0ac6d1b13981bd5cc720e44c37cceaf84b1e058fea5ea1f88465ffd0250f99a01e"}, 0x70, 0x1) 10:39:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xd}, 0xd) [ 200.348625][T11760] IPVS: ftp: loaded support on port[0] = 21 10:39:24 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:24 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:39:24 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = fcntl$dupfd(r2, 0x0, r1) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x3d5c7804, 0x22000) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) splice(r5, 0x0, r4, 0x0, 0xffffffffffff8001, 0x4) 10:39:24 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x2500, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xe}, 0xd) 10:39:24 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x1, 0x0) 10:39:24 executing program 4: unshare(0x40600) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb704, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000)=0x2, 0x4) [ 200.729547][T11820] IPVS: ftp: loaded support on port[0] = 21 10:39:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x10}, 0xd) 10:39:24 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:24 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:24 executing program 4: unshare(0x40600) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb704, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000)=0x2, 0x4) 10:39:24 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x1, 0x0) 10:39:24 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x11}, 0xd) 10:39:24 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x0) r5 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:24 executing program 4: unshare(0x40600) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb704, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000)=0x2, 0x4) 10:39:25 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x1, 0x0) 10:39:25 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 201.098656][T11880] IPVS: ftp: loaded support on port[0] = 21 10:39:25 executing program 4: unshare(0x40600) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb704, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000)=0x2, 0x4) 10:39:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x12}, 0xd) 10:39:25 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:25 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x5c00, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:25 executing program 4: unshare(0x40600) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb704, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:25 executing program 0: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="e1683bb9a74f43882935c3205f51c9c1"}, {0xa, 0x0, 0x0, @rand_addr="f2f909879815e4f0540ff0002573bbb9"}, r2}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in6={0xa, 0x4e22, 0x20, @ipv4={[], [], @multicast1}}}}, 0x90) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r7 = fcntl$dupfd(r6, 0x0, r5) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfef0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000100)={0x0, 0x7530}, 0x10) setsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000000)=0x4, 0x4) splice(r3, 0x0, r5, 0x0, 0x7ffffffe, 0x4) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x202000, 0x0) ioctl$SIOCX25SDTEFACILITIES(r8, 0x89eb, &(0x7f00000002c0)={0x5, 0x1, 0x5, 0x4, 0x4, 0x9, 0x1b, "a3bcf5287895c955092a6a625c985544a08dd979", "52bb97071652acccf58085b16e68ba5761c07a51"}) [ 201.404974][T11918] IPVS: ftp: loaded support on port[0] = 21 10:39:25 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x25}, 0xd) 10:39:25 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) fcntl$dupfd(r3, 0x0, r2) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) syz_open_dev$tty1(0xc, 0x4, 0x4) 10:39:25 executing program 4: unshare(0x40600) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb704, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:25 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 201.576315][T11950] IPVS: ftp: loaded support on port[0] = 21 10:39:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x5c}, 0xd) 10:39:25 executing program 4: unshare(0x40600) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb704, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:25 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:25 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:25 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) socket$nl_crypto(0x10, 0x3, 0x15) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ipvlan0\x00', 0x10) r5 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:25 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x180}, 0xd) 10:39:25 executing program 4: unshare(0x40600) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb704, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:26 executing program 4: unshare(0x40600) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 202.024576][T12022] IPVS: ftp: loaded support on port[0] = 21 10:39:26 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = dup(r5) ioctl$sock_netrom_SIOCDELRT(r6, 0x890c, &(0x7f0000000100)={0x1, @null, @bpq0='bpq0\x00', 0x7, 'syz0\x00', @null, 0x2, 0x3, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 202.131637][T12028] IPVS: ftp: loaded support on port[0] = 21 10:39:26 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x300}, 0xd) 10:39:26 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:26 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r3, 0x4122, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xb0, 0xb, 0x3}) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000080)) r5 = socket$nl_rdma(0x10, 0x3, 0x14) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0xa3ea48575bd4f9d0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r6, 0x111, 0x2, 0x1, 0x4) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) splice(r7, 0x0, r5, 0x0, 0xe0, 0x4) 10:39:26 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:26 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:26 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 202.516651][T12082] IPVS: ftp: loaded support on port[0] = 21 10:39:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:28 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x500}, 0xd) 10:39:28 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x3) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r2, 0x0, r1) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) splice(r0, 0x0, r1, 0x0, 0x7ffffffe, 0x4) 10:39:28 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:28 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:28 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:28 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:28 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x600}, 0xd) [ 204.403857][T12150] IPVS: ftp: loaded support on port[0] = 21 10:39:28 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:28 executing program 4: unshare(0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:28 executing program 1: unshare(0x40600) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:28 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 204.691384][T12201] IPVS: ftp: loaded support on port[0] = 21 10:39:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = fcntl$dupfd(r4, 0x0, r2) r6 = pidfd_getfd(r5, r5, 0x0) write$6lowpan_control(r6, &(0x7f0000000080)='connect aa:aa:aa:aa:aa:11 0', 0x1b) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:29 executing program 4: unshare(0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x700}, 0xd) 10:39:29 executing program 1: unshare(0x40600) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, 0x0, 0x0, 0x10000, 0x0) 10:39:29 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:29 executing program 4: unshare(0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 1: unshare(0x40600) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x900}, 0xd) 10:39:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) ptrace$setsig(0x4203, r3, 0x0, &(0x7f0000000100)={0x3d, 0x0, 0x2}) close(r2) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = fcntl$dupfd(r4, 0x0, r2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 205.195096][T12249] IPVS: ftp: loaded support on port[0] = 21 10:39:29 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:29 executing program 4: unshare(0x40600) r0 = open(0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$EVIOCRMFF(r4, 0x40044581, &(0x7f0000000080)=0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2c6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x34}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x100, r8, 0x11b, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x419}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x60000}]}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x800}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xa876}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000000}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7004}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x10}, 0x20000895) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xa00}, 0xd) 10:39:29 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 4: unshare(0x40600) r0 = open(0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, 0x0, 0x0, 0x10000, 0x0) [ 205.454460][T12298] tipc: MTU too low for tipc bearer [ 205.482563][T12298] tipc: MTU too low for tipc bearer 10:39:29 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xb00}, 0xd) 10:39:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x1, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r5) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000200)={r7, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={r7, 0x1, 0x20, 0x380000000000, 0x5}, &(0x7f00000002c0)=0x18) r8 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x20, 0x2000) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="e1683bb9a74f43882935c3205f51c9c1"}, {0xa, 0x0, 0x0, @rand_addr="f2f909879815e4f0540ff0002573bbb9"}, r10}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x0, 0x3, "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", 0x5, 0x1, 0x2, 0x1, 0xf6, 0x1f, 0x97, 0x1}, r10}}, 0x128) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:29 executing program 4: unshare(0x40600) r0 = open(0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xc00}, 0xd) 10:39:29 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 205.638990][T12312] IPVS: ftp: loaded support on port[0] = 21 10:39:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f0000000200)=0x7, 0x4) close(r1) r3 = socket$inet(0x2, 0x3, 0x1) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) sendmsg$IPSET_CMD_DEL(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0xa, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8}]}, 0x30}}, 0x8041) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) fcntl$dupfd(r3, 0x0, r1) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x27, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xa341, 0x1, [@default, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) creat(&(0x7f0000000280)='./file0\x00', 0x2) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000440)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x44, r6, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'caif0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0xc080}, 0x40041) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="10000002145c0000007000fcdbdf2500"], 0x10}, 0x1, 0x0, 0x0, 0x81}, 0x4000001) 10:39:29 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 4: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xd00}, 0xd) 10:39:29 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, 0x0, 0x0, 0x10000, 0x0) 10:39:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000440)={&(0x7f0000000140)="cbd6ee619d4a0cfc51b3c25ab6fdd890fb3130c6e878897725ebeb5337a5eabf8bde97adb87de8d00f81cccf5a647fe906def5a19bd6f74e77348d58865589d7aaa5b06ac1f35292200ab76ea49df293ff2c011869fddf45750992", &(0x7f00000001c0)=""/250, &(0x7f00000002c0)="9de76bce999090db2e529cfd69a2d2a4c4e253abfc915e07ff1d1fe07dc0e7d725d057c08761b291afa04ffda5bf24d8a7cf1165b5b0917cbc6c742b28532b9b620341423f8248d7a68a6da62f2785654e19ac736a0edcd37227e5", &(0x7f0000000340)="b01ed4db70cbe737c0d5efa81d14d1d8f0fa605d1f669efe7fdb742b60bbb4bc038cf1c858203362d567780f5b8a5ac3dfaf9b36c152872356bc096e9ed872733f2286b03ff180f0ca1149197ac63fb8f3026cd904f0bc25da04dfca646c6018a276ad834f2a1cf1410478a85b88922070531bcb2c9a66b6dafe63a5885c0fe590a169b13e93a3c7128460100251f4365113bcaf8226857d985b55d4d555c5d8bf57caa0a938ed50e5627d1aff14732c5a73f3b1948f791b4ef04ef4466366b505ee0e355e60d5202ca442ed80e8996ea35dcba6bd7a08", 0x5, r0}, 0x38) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KVM_GET_TSC_KHZ(r3, 0xaea3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = fcntl$dupfd(r4, 0x0, r2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) pipe2(&(0x7f0000000100), 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000080)={0x0, 0x8}) 10:39:29 executing program 1: unshare(0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 4: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xe00}, 0xd) 10:39:29 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:30 executing program 1: unshare(0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 206.046320][T12383] IPVS: ftp: loaded support on port[0] = 21 10:39:30 executing program 4: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x1100}, 0xd) 10:39:30 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:30 executing program 1: unshare(0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:30 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, 0x0) 10:39:30 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300), 0x0, 0x10000, 0x0) 10:39:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x1200}, 0xd) 10:39:30 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) fsetxattr$security_capability(r2, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0xff}, {0x7, 0x9}]}, 0x14, 0x1) r3 = fcntl$dupfd(r2, 0x0, r1) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000140)={0x3, 0xb, 0x4, 0x851b0ee767cb2a78, 0x1, {}, {0x2, 0xf, 0x5, 0x7, 0x2, 0x2, "7a27d4a1"}, 0x4, 0x3, @fd, 0x4, 0x0, 0xffffffffffffffff}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0101000000000000000001000000440001000c00070000000000000000000c0006006c626c637200000008000b000000700008000800000000000800090000000000080001000a0000000800050002000000"], 0x58}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r5, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=r7, @ANYBLOB="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"], 0x138}, 0x1, 0x0, 0x0, 0x810}, 0xc000) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) splice(r1, 0x0, r8, 0x0, 0x7ffffffe, 0x0) 10:39:30 executing program 1: unshare(0x40600) r0 = open(0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:30 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, 0x0) [ 206.419362][T12439] IPVS: ftp: loaded support on port[0] = 21 10:39:30 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 206.474010][T12444] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 10:39:30 executing program 1: unshare(0x40600) r0 = open(0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 206.527728][T12451] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 10:39:30 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, 0x0) 10:39:30 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SIOCAX25ADDFWD(r5, 0x89ea, &(0x7f0000000080)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) sendmsg$NFT_MSG_GETSET(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="980000000a0a050000000000000000000500000708000c400000001f080007400000003e0900010073797a13000000003c0009800800014000000000080001400000975e08000000000000060800014080000000080001400000001f080001400000040508000140000007ff08f4024000000029080004400000000a080007400000001a0c00324000000000000000030800084000000001"], 0x98}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TCSETAW(r6, 0x5407, &(0x7f0000000280)={0x6, 0x6, 0x6, 0xfffc, 0xf, "b9369a87f8ab54e6"}) 10:39:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x2500}, 0xd) 10:39:30 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300), 0x0, 0x10000, 0x0) 10:39:30 executing program 1: unshare(0x40600) r0 = open(0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:30 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0xb}) 10:39:30 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x5c00}, 0xd) 10:39:30 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0xb}) 10:39:30 executing program 1: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 206.808102][T12500] IPVS: ftp: loaded support on port[0] = 21 10:39:30 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='batadv_slave_0\x00', 0x10) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x40000) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$UDMABUF_CREATE(r5, 0x40187542, &(0x7f0000000100)={r6, 0x0, 0x10000, 0x1000}) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r8 = fcntl$dupfd(r4, 0x0, r7) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'security.', '/dev/vcs#\x00'}, &(0x7f0000000200)='em1\x00', 0x4, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000140)={{0x0, 0x989680}}, &(0x7f0000000180)) connect$inet(r8, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:30 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:30 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000002c0)={r6, 0x3, 0x3}, &(0x7f0000000300)=0x8) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000140)={0x2, 0x1000000000001}) ioctl$SOUND_PCM_READ_CHANNELS(r5, 0x80045006, &(0x7f0000000100)) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x1000000}, 0xd) 10:39:30 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0xb}) 10:39:31 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300), 0x0, 0x10000, 0x0) 10:39:31 executing program 1: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:31 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:31 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) read(r2, &(0x7f0000000100)=""/121, 0x79) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0xe842, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r5, 0x2) 10:39:31 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e}) 10:39:31 executing program 1: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x2000000}, 0xd) [ 207.189193][T12567] IPVS: ftp: loaded support on port[0] = 21 10:39:31 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, 0x0) 10:39:31 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x11000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:31 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e}) 10:39:31 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, 0x0) 10:39:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x3000000}, 0xd) 10:39:31 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:39:31 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e}) 10:39:31 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 207.549665][T12625] IPVS: ftp: loaded support on port[0] = 21 10:39:32 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000080)={'wg1\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:32 executing program 4 (fault-call:2 fault-nth:0): unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:32 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, 0x0) 10:39:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x4000000}, 0xd) 10:39:32 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 208.127910][T12682] FAULT_INJECTION: forcing a failure. [ 208.127910][T12682] name failslab, interval 1, probability 0, space 0, times 0 [ 208.142610][T12682] CPU: 1 PID: 12682 Comm: syz-executor.4 Not tainted 5.6.0-rc7-syzkaller #0 [ 208.151307][T12682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.161367][T12682] Call Trace: [ 208.164666][T12682] dump_stack+0x1e9/0x30e [ 208.169011][T12682] should_fail+0x433/0x5b0 10:39:32 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0xb}) 10:39:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x5000000}, 0xd) [ 208.173454][T12682] ? tomoyo_realpath_from_path+0xd8/0x630 [ 208.179180][T12682] should_failslab+0x5/0x20 [ 208.183691][T12682] __kmalloc+0x74/0x330 [ 208.187869][T12682] ? tomoyo_realpath_from_path+0xcb/0x630 [ 208.193606][T12682] tomoyo_realpath_from_path+0xd8/0x630 [ 208.199159][T12682] ? rcu_lock_acquire+0x5/0x30 [ 208.203947][T12682] tomoyo_path_number_perm+0x18f/0x690 [ 208.209479][T12682] security_file_ioctl+0x55/0xb0 [ 208.214455][T12682] __se_sys_ioctl+0x48/0x160 [ 208.219064][T12682] do_syscall_64+0xf3/0x1b0 10:39:32 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 208.223587][T12682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.229491][T12682] RIP: 0033:0x45c849 [ 208.233390][T12682] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 208.253015][T12682] RSP: 002b:00007f76d5939c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 208.261436][T12682] RAX: ffffffffffffffda RBX: 00007f76d593a6d4 RCX: 000000000045c849 [ 208.269416][T12682] RDX: 0000000020000040 RSI: 00000000c020662a RDI: 0000000000000003 [ 208.277422][T12682] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 208.285402][T12682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 208.293367][T12682] R13: 00000000000002f6 R14: 00000000004c550e R15: 0000000000000000 [ 208.317598][T12682] ERROR: Out of memory at tomoyo_realpath_from_path. 10:39:32 executing program 4 (fault-call:2 fault-nth:1): unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:32 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:39:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x6000000}, 0xd) 10:39:32 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0xb}) [ 208.513492][T12708] FAULT_INJECTION: forcing a failure. [ 208.513492][T12708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 208.526762][T12708] CPU: 0 PID: 12708 Comm: syz-executor.4 Not tainted 5.6.0-rc7-syzkaller #0 [ 208.535485][T12708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.545573][T12708] Call Trace: [ 208.548873][T12708] dump_stack+0x1e9/0x30e [ 208.553220][T12708] should_fail+0x433/0x5b0 [ 208.557665][T12708] prepare_alloc_pages+0x28c/0x4a0 10:39:32 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:32 executing program 0: pipe(&(0x7f0000000000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x3f) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000140)={0x6, 0x9, 0x4, 0x2, 0x1, {0x0, 0x2710}, {0x2, 0x1, 0x9, 0x2, 0x7a, 0x4, "49c6ac8a"}, 0x101, 0x2, @offset=0x2, 0x9}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(0xffffffffffffffff, 0x4140, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) kcmp(0x0, r2, 0x5, r3, r0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x5) 10:39:32 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0xb}) [ 208.562796][T12708] __alloc_pages_nodemask+0xbf/0x600 [ 208.568115][T12708] kmem_getpages+0x49/0x930 [ 208.572633][T12708] cache_grow_begin+0x7b/0x2e0 [ 208.577410][T12708] cache_alloc_refill+0x346/0x3e0 [ 208.582446][T12708] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 208.588200][T12708] ? check_preemption_disabled+0xb0/0x240 [ 208.593938][T12708] ? debug_smp_processor_id+0x5/0x20 [ 208.599240][T12708] __kmalloc+0x30c/0x330 [ 208.603487][T12708] ? tomoyo_realpath_from_path+0xd8/0x630 10:39:32 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x4e20, @multicast2}}) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 208.609391][T12708] tomoyo_realpath_from_path+0xd8/0x630 [ 208.615473][T12708] ? rcu_lock_acquire+0x5/0x30 [ 208.620265][T12708] tomoyo_path_number_perm+0x18f/0x690 [ 208.625910][T12708] security_file_ioctl+0x55/0xb0 [ 208.630898][T12708] __se_sys_ioctl+0x48/0x160 [ 208.635506][T12708] do_syscall_64+0xf3/0x1b0 [ 208.640028][T12708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.645923][T12708] RIP: 0033:0x45c849 [ 208.649815][T12708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 208.669422][T12708] RSP: 002b:00007f76d5939c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 208.672917][T12710] IPVS: ftp: loaded support on port[0] = 21 [ 208.677838][T12708] RAX: ffffffffffffffda RBX: 00007f76d593a6d4 RCX: 000000000045c849 [ 208.677856][T12708] RDX: 0000000020000040 RSI: 00000000c020662a RDI: 0000000000000003 [ 208.677861][T12708] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 10:39:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x7000000}, 0xd) 10:39:32 executing program 4 (fault-call:2 fault-nth:2): unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 208.677867][T12708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 208.677873][T12708] R13: 00000000000002f6 R14: 00000000004c550e R15: 0000000000000001 [ 208.823028][T12750] FAULT_INJECTION: forcing a failure. [ 208.823028][T12750] name failslab, interval 1, probability 0, space 0, times 0 [ 208.848124][T12750] CPU: 1 PID: 12750 Comm: syz-executor.4 Not tainted 5.6.0-rc7-syzkaller #0 [ 208.856839][T12750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.866917][T12750] Call Trace: [ 208.870216][T12750] dump_stack+0x1e9/0x30e [ 208.874558][T12750] should_fail+0x433/0x5b0 [ 208.878992][T12750] ? tomoyo_encode2+0x25a/0x560 [ 208.883840][T12750] should_failslab+0x5/0x20 [ 208.888349][T12750] __kmalloc+0x74/0x330 [ 208.892521][T12750] tomoyo_encode2+0x25a/0x560 [ 208.897208][T12750] tomoyo_realpath_from_path+0x5d6/0x630 [ 208.902860][T12750] tomoyo_path_number_perm+0x18f/0x690 [ 208.908387][T12750] security_file_ioctl+0x55/0xb0 [ 208.913337][T12750] __se_sys_ioctl+0x48/0x160 [ 208.917936][T12750] do_syscall_64+0xf3/0x1b0 [ 208.922448][T12750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.928342][T12750] RIP: 0033:0x45c849 [ 208.932237][T12750] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 208.951872][T12750] RSP: 002b:00007f76d5939c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 208.960292][T12750] RAX: ffffffffffffffda RBX: 00007f76d593a6d4 RCX: 000000000045c849 [ 208.968273][T12750] RDX: 0000000020000040 RSI: 00000000c020662a RDI: 0000000000000003 [ 208.976253][T12750] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 208.984233][T12750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 208.992298][T12750] R13: 00000000000002f6 R14: 00000000004c550e R15: 0000000000000002 10:39:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x8000000}, 0xd) 10:39:32 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e}) [ 209.020041][T12750] ERROR: Out of memory at tomoyo_realpath_from_path. 10:39:33 executing program 4 (fault-call:2 fault-nth:3): unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:39:33 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = open(&(0x7f0000000100)='./file0\x00', 0x79db43, 0x1a0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) close(r5) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000180)={0x0, 0x1}, 0x8) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000000080)) r7 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r8 = fcntl$dupfd(r7, 0x0, r2) connect$inet(r8, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:33 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x25000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:33 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e}) 10:39:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x9000000}, 0xd) 10:39:33 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:33 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x2, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:33 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e}) 10:39:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xa000000}, 0xd) 10:39:33 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="00f22c02ff43118020880aae5b08f08cc4f8f9a410e61958c3901d0f70a10c70c4d1777fde8b13d35d0a"], 0x2c, 0x3) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) fcntl$dupfd(r3, 0x0, r2) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1}}, 0xffffff20) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) openat$smackfs_netlabel(0xffffffffffffff9c, &(0x7f0000000140)='/sys/fs/smackfs/netlabel\x00', 0x2, 0x0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 209.463046][T12784] IPVS: ftp: loaded support on port[0] = 21 10:39:33 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:39:33 executing program 2 (fault-call:7 fault-nth:0): clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:33 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x10, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xb000000}, 0xd) [ 209.739094][T12829] IPVS: ftp: loaded support on port[0] = 21 [ 209.748108][T12828] IPVS: ftp: loaded support on port[0] = 21 10:39:33 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r7) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, r7) r8 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r10 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r9) write$binfmt_misc(r5, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRESOCT=r2, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRESDEC=r8, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="a233d440798f6555bb03df9c2733f2749c99487bd6e6cd090f88498e4fcaf5e4c08554af4df6558c6375a847b276dccc9d4fe71802237f", @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=0x0]], @ANYRESOCT=r10], @ANYBLOB="35f68cfec04626897ba8be20066ade17f04485b53791c72633718887ba889cce08a4c4cb6b02e9cb7f66e5c62e7ac0d0e9f84db19057ddd9f67f49db789db7ff3d42580a86d6ff5dd19b9703c9baf92e64492d9e690945c8d1eeaf00ae9cfa878cc495c8a27e3975ae54fc5f04dab6d6ec119217e8f0b6cf2e7be537b82bacb94af1bfafbb9052f278b666f80d4254da73b2bec4f32806b52d2d55ede7dc94e69683d7588910a325cf63cb1eb278879c2f928e02d8ae4b785aa25a00000000007c97857d8919bb", @ANYRESOCT=r3], @ANYRESDEC, @ANYRESOCT=0x0, @ANYRES16=0x0, @ANYRESDEC, @ANYRESHEX=0x0]], 0x8) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:33 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x2285, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:33 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xc000000}, 0xd) 10:39:33 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4b49, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:33 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4b72, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:33 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x5c000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:34 executing program 1 (fault-call:2 fault-nth:0): unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xd000000}, 0xd) 10:39:34 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4c01, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 210.133152][T12910] IPVS: ftp: loaded support on port[0] = 21 [ 210.152470][T12916] FAULT_INJECTION: forcing a failure. [ 210.152470][T12916] name failslab, interval 1, probability 0, space 0, times 0 [ 210.198531][T12916] CPU: 1 PID: 12916 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 210.207254][T12916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.217318][T12916] Call Trace: [ 210.220736][T12916] dump_stack+0x1e9/0x30e [ 210.225088][T12916] should_fail+0x433/0x5b0 [ 210.229539][T12916] ? tomoyo_realpath_from_path+0xd8/0x630 [ 210.235269][T12916] should_failslab+0x5/0x20 [ 210.239779][T12916] __kmalloc+0x74/0x330 10:39:34 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5387, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 210.243952][T12916] ? tomoyo_realpath_from_path+0xcb/0x630 [ 210.249681][T12916] tomoyo_realpath_from_path+0xd8/0x630 [ 210.255234][T12916] ? rcu_lock_acquire+0x5/0x30 [ 210.260014][T12916] tomoyo_path_number_perm+0x18f/0x690 [ 210.265564][T12916] security_file_ioctl+0x55/0xb0 [ 210.270519][T12916] __se_sys_ioctl+0x48/0x160 [ 210.275114][T12916] do_syscall_64+0xf3/0x1b0 [ 210.279602][T12916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.286428][T12916] RIP: 0033:0x45c849 [ 210.290337][T12916] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.309936][T12916] RSP: 002b:00007f57fc8edc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 210.318358][T12916] RAX: ffffffffffffffda RBX: 00007f57fc8ee6d4 RCX: 000000000045c849 [ 210.326341][T12916] RDX: 0000000020000040 RSI: 00000000c020662a RDI: 0000000000000003 [ 210.334323][T12916] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 210.342305][T12916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 210.350303][T12916] R13: 00000000000002f6 R14: 00000000004c550e R15: 0000000000000000 [ 210.368701][T12916] ERROR: Out of memory at tomoyo_realpath_from_path. 10:39:34 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) 10:39:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xe000000}, 0xd) 10:39:34 executing program 1 (fault-call:2 fault-nth:1): unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:34 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x541b, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:34 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 210.721679][T12971] FAULT_INJECTION: forcing a failure. [ 210.721679][T12971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 210.734924][T12971] CPU: 1 PID: 12971 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 210.743605][T12971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.753699][T12971] Call Trace: [ 210.756999][T12971] dump_stack+0x1e9/0x30e [ 210.761347][T12971] should_fail+0x433/0x5b0 [ 210.765789][T12971] prepare_alloc_pages+0x28c/0x4a0 10:39:34 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1_to_bridge\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r6) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r7) r8 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r9) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYRES16, @ANYRES32=r6, @ANYRES64=0x0, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES32=r7, @ANYRES32], @ANYRES32=r8, @ANYBLOB="dc103755a8a4e785cc78ab05bfd7d52780a2816f6cd7472db4ba2b7e73ec9fcbcc02a2fa23e419a819ce99554d8f2e42de9a83cb94881617aa636ba7f478acd16a78c23db5ccc9506fb2877992d0a49164ef102d4e96e0dea57096d8413356a7e642be2bce8282693b4a70d1ef87a547681e0b00536bd7c0473c0086fa80c4879f6e311dfbc85bcdce5a4d97d16da43d5144d38aab23572b738208c71701d1d8a3a5ef27fe3947253a4417afb0cd50bcc578b5a8464fff082bd3c7aceb8e6fbb64ba6e0e0f999d0e2c27129754d707827602d550fad00d4f2ee846436f0734dc4af3", @ANYRES16=r10], 0xfe) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:34 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5421, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 210.770929][T12971] __alloc_pages_nodemask+0xbf/0x600 [ 210.776256][T12971] kmem_getpages+0x49/0x930 [ 210.780787][T12971] cache_grow_begin+0x7b/0x2e0 [ 210.783888][T12975] IPVS: ftp: loaded support on port[0] = 21 [ 210.785720][T12971] cache_alloc_refill+0x346/0x3e0 [ 210.785735][T12971] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 210.785745][T12971] ? check_preemption_disabled+0xb0/0x240 [ 210.785754][T12971] ? debug_smp_processor_id+0x5/0x20 [ 210.785770][T12971] __kmalloc+0x30c/0x330 [ 210.785784][T12971] ? tomoyo_realpath_from_path+0xd8/0x630 [ 210.785798][T12971] tomoyo_realpath_from_path+0xd8/0x630 [ 210.785806][T12971] ? rcu_lock_acquire+0x5/0x30 [ 210.785834][T12971] tomoyo_path_number_perm+0x18f/0x690 [ 210.839165][T12971] security_file_ioctl+0x55/0xb0 [ 210.844117][T12971] __se_sys_ioctl+0x48/0x160 [ 210.848722][T12971] do_syscall_64+0xf3/0x1b0 [ 210.853254][T12971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.859154][T12971] RIP: 0033:0x45c849 [ 210.863050][T12971] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.882768][T12971] RSP: 002b:00007f57fc8edc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 210.891219][T12971] RAX: ffffffffffffffda RBX: 00007f57fc8ee6d4 RCX: 000000000045c849 [ 210.899230][T12971] RDX: 0000000020000040 RSI: 00000000c020662a RDI: 0000000000000003 [ 210.907212][T12971] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 10:39:34 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000180)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x2, 0x20}) fcntl$dupfd(r3, 0x0, r2) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x80000, 0x8, {0x0, 0x2710}, {0x0, 0x8, 0x6, 0x5, 0xff, 0x2, "91e9790f"}, 0x7, 0x2, @planes=&(0x7f0000000080)={0x5, 0x9, @mem_offset=0x81, 0xefc}, 0x8, 0x0, r1}) 10:39:34 executing program 1 (fault-call:2 fault-nth:2): unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x10000000}, 0xd) [ 210.915227][T12971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 210.923206][T12971] R13: 00000000000002f6 R14: 00000000004c550e R15: 0000000000000001 10:39:34 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2, 0x0}}], 0x1, 0x10000, 0x0) 10:39:35 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:35 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5450, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:35 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x0, 0x1) r4 = openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f0000000080)='/sys/fs/smackfs/change-rule\x00', 0x2, 0x0) r5 = dup(r4) r6 = open(&(0x7f00000002c0)='./file0\x00', 0x501140, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) flock(r6, 0xc) r7 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) openat$smackfs_revoke_subject(0xffffffffffffff9c, &(0x7f0000000340)='/sys/fs/smackfs/revoke-subject\x00', 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000300)={0x400000000000e, 0xb, 0x100000000}) splice(r8, 0x0, r1, 0x0, 0x3f80000000000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x412000, 0x0) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x80802, 0x0) read$snddsp(r5, &(0x7f0000000180)=""/206, 0xce) setsockopt$SO_J1939_PROMISC(r9, 0x6b, 0x2, &(0x7f0000000140)=0x1, 0x4) 10:39:35 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x11000000}, 0xd) [ 211.118159][T13024] IPVS: ftp: loaded support on port[0] = 21 10:39:35 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5451, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:35 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x2, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:35 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xebffffff, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x12000000}, 0xd) 10:39:35 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x10, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:35 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x3, 0x0}}], 0x1, 0x10000, 0x0) 10:39:35 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5452, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 211.490807][T13086] IPVS: ftp: loaded support on port[0] = 21 10:39:35 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x4, 0x0}}], 0x1, 0x10000, 0x0) 10:39:35 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x127f, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 211.636193][T13126] IPVS: ftp: loaded support on port[0] = 21 10:39:35 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x6) 10:39:35 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x25000000}, 0xd) 10:39:35 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5460, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:35 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x460f, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:35 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x5, 0x0}}], 0x1, 0x10000, 0x0) [ 212.080471][T13167] IPVS: ftp: loaded support on port[0] = 21 10:39:36 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4c00, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:36 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6364, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:36 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x5c000000}, 0xd) 10:39:36 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) syz_mount_image$minix(&(0x7f0000000100)='minix\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x5, &(0x7f0000000500)=[{&(0x7f0000000180)="1573b0a10da116a5a9e6ba8e7f8fad7b5b4930d398961cfbeddb69db966e076452414cc8513a5aff086002ffe7b402dfb52b59e67ac1cb4bc77a7375133d753f5391fcb601d42c84c22cbe89cd148d7a950a3bc38bcad42260c862371d889f15803d6bbef146d78b81b3cc1c22e5e49a315a1211316b75778c6fbc6c7360053c35478b31e456f5772a81cbf8c4efd0908201eba8157c71b823358926926741", 0x9f, 0x2}, {&(0x7f0000000240)="4f05604f3870ac465893cc19a45195aa47cff0c78d936920f44de6ab0b21749bb96ab3f0fddc3f9c91cf0ae07c571f41674ca0b9fe5a68d277e169ec5fdf9e9f39d08e608c6884c2466bd965c81b8cb3567f656078d70f5ce9d5c9acde172db788d3ef15c0001e663a95deb5902bd26f5c80c72b366f6974541216b551bcba8d2a028eaac2bf0deb5b", 0x89, 0x81}, {&(0x7f0000000300)="c58f5ddea9b93f39da16507d9909723893f565a1cf74b25cf8f43bee748bd6895e86ad87144cf2d7f261143a2ebd235bc4511bbbdc852044f92c9984c2ea460ac76eaecd384c39e95f556b0739c2f0e8546a2845cfe36efc25eab8f0602409cd9e2b289066e0988eb67e24f68ee64c50c34382a4d7353f339d3448dc1e38e977a89c73e3819a3f20d723d5e02cff18b598236bd3919ae3d06e292729db45a770e62c460ab91e206ba86321c60288c5ee7d94e02077c558c07f023f365e4a44dfcf9cad4ec243a03fd26a037a123d93dd0d04c239dd2dabb3aef5b8b9f5ef5e8d17bef5326490a37d2de77ccda1b4b2", 0xef, 0xfff}, {&(0x7f0000000400), 0x0, 0x5}, {&(0x7f0000000440)="85961a8fe2df81730e78dfc4262db3e10707a272a91abe4144bfd7f4e67ebb07cc5ee4a7d0839413c7d0a895488f8a31806f19152c17c2c84e202234add14ab810362d2cb129e4ea728645f5eabe1cea4e6bca6e96813b2bef14b93be6c8050db763c8df3c824423c28d21a1b9c48da8cbfa5db5f5a5f45a2e99f142afc16208ad19267ba02d764abf7009f33922f5c46b2a75b996c86535707be934064ba276a524", 0xa2, 0x100000000}], 0x1004, 0x0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FS_IOC_FSGETXATTR(r5, 0x801c581f, &(0x7f0000000080)={0x80, 0x0, 0x2, 0x1, 0x704}) 10:39:36 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6609, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0x80010000}, 0xd) 10:39:36 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x6, 0x0}}], 0x1, 0x10000, 0x0) 10:39:36 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4c01, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:36 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xebffffff}, 0xd) 10:39:36 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x660c, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 212.558669][T13234] IPVS: ftp: loaded support on port[0] = 21 10:39:36 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x541b, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:36 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) recvfrom$inet(r3, &(0x7f0000000200)=""/95, 0x5f, 0x40008041, &(0x7f0000000280)={0x2, 0x4e21, @local}, 0x10) close(r2) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r4, 0xc1004111, &(0x7f0000000100)={0xfffffffa, [0x800, 0x2de, 0xfffffff9], [{0xffffffff, 0x3, 0x0, 0x1, 0x1, 0x1}, {0x400, 0xfffff684, 0x1, 0x1, 0x0, 0x1}, {0x4, 0xf1e, 0x1, 0x1, 0x0, 0x1}, {0x8, 0x7, 0x0, 0x0, 0x1, 0x1}, {0x40, 0x8, 0x0, 0x1}, {0x5, 0x4}, {0x2, 0x3, 0x0, 0x0, 0x1, 0x1}, {0x7, 0x14000, 0x1}, {0x5, 0x8, 0x1, 0x1}, {0x1, 0x7fffffff, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x3, 0x1, 0x1, 0x0, 0x1}, {0x8, 0x0, 0x1, 0x1, 0x1, 0x1}], 0x8}) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000080)={0x5, 0x200, 0x7}) r7 = fcntl$dupfd(r5, 0x0, r2) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) bind$isdn_base(0xffffffffffffffff, &(0x7f00000002c0)={0x22, 0x0, 0x6, 0x5d, 0x7f}, 0x6) 10:39:36 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x7, 0x0}}], 0x1, 0x10000, 0x0) 10:39:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xfeffffff}, 0xd) 10:39:36 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6611, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:36 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:36 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5421, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:36 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_S_CTRL(r6, 0xc008561c, &(0x7f0000000340)={0x8, 0x6}) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x44}, 0x1, 0x0, 0x0, 0x4080}, 0x4040000) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000100)) r7 = open(&(0x7f0000000300)='.\x00', 0x204100, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$IPSET_CMD_PROTOCOL(r7, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x1, 0x6, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}}, 0x14}, 0x1, 0x0, 0x0, 0x40090}, 0x1) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="24000000030820cf90b73d1185f500f00b000001da28070efeff0300"], 0x1}, 0x1, 0x0, 0x0, 0x4008894}, 0x4000011) 10:39:36 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6612, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 212.878263][T13286] IPVS: ftp: loaded support on port[0] = 21 10:39:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xffffffeb}, 0xd) 10:39:36 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6628, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:36 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5450, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:36 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:37 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x8912, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x8, 0x0}}], 0x1, 0x10000, 0x0) 10:39:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$smackfs_access(r4, &(0x7f0000000080)={'ip_vti0\x00', 0x20, 'vmnet0user', 0x20, 'wx'}, 0x17) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:37 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5451, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3, 0xfffffffe}, 0xd) 10:39:37 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x8933, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r2, 0x3, &(0x7f0000000440)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='\f', 0x1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) io_cancel(r2, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x2, 0xfff9, r1, &(0x7f0000002ac0)="452bd717c2e037d8d489338b64d0ad9f40e5267159307b66c0608d9ec26b60c2332cc8da2e5681fd44f10447e3c38c6d6dd3aeea8bd1ee5663572e8dc2e95740eeb37e5f362ebc462e69042fa378610d3adedc79d169d8d51f960a4859664eb8f9ef68cf36e0125c7cc0beef52676b1dc8b0a51769bd14e2cb34d654855aafb2997a734e1a324854c6182138b2d81f793a10c2f90a926d", 0x97, 0x2, 0x0, 0x3}, &(0x7f0000002bc0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) r5 = fcntl$dupfd(r4, 0x0, r3) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$IMCTRLREQ(r6, 0x80044945, &(0x7f0000001580)={0x800, 0x1, 0x0, 0x5}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xa}) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_mreqn(r8, 0x0, 0x20, &(0x7f0000002940)={@loopback, @empty, 0x0}, &(0x7f0000002980)=0xc) sendmmsg$inet(r7, &(0x7f0000002a40)=[{{&(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000001500)=[{&(0x7f00000000c0)="b3c2f4ef2bd0e4a7694ab27202835a1b043957af32f4610251548b6f430a50f8c08cef973578563c1847acdb12b6e05aad277e448456fb4a17fb1cea7d29bd09f50f5a9b9e4b1d0b042c105efdd1e2edd400272075cc08c52a4642be54f74509fa81b1a1edbcabdca1a00404", 0x6c}, {&(0x7f0000000140)="83a8b7f7675937ff1f511225c903a5bcf84d32c8d1a8724f379ffa2e6df48a8a323dbb056fb4c2c6eb58fad02a1706d2dba6d504f8d1e2eb5e81f6c6a0ac221bf5407778f2cfa4dc3db8cdbc07ca0ff8a0b9218de64ae3c830f7f2d2c9e723b7d3bf41787d95aaf84df825222e9116777b0721e711e4f47314f457eadc9f752db729740d70c4bc29b66447081e21ef6ed375ed1880749f2eaa11144277ea772cd78de588d4cfd97f1c5946e6850a13a514e11c8742c0ea1c96760918daf5bd4b", 0xc0}, {&(0x7f0000000200)="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", 0xfd}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="1b7a9ee645ef1cd2412c4a0dacd5ad8e72fd92eb8df91b4757d19a82518660933431eac6bb155273157e87d898da9ab173ea51761e13671c5e66d0945ff068728825b8296db6cb3b9f470bb9d5a95692de965afcb9518d8e92c2fa59d683b6cf9b0da8aab1986a93eb129890151ebaaacc75d0d6c9af0f1fed80012c59eb8492852da32f772d71b0", 0x88}, {&(0x7f00000013c0)="17ed2527fa5291f7e50a3152adef3bb943dc8792ad4a11815b5a6596faae003ac9bf988aa38156bc76f0e28de4db80667b0a46595c075632c5f0540b74eeb556a7fb7112b353f06b3a7330034adfc01d474595e13342089fc13d42c5f69f91a107febd987fa5b830ad3322f2a16aa841e0f197d6f4e541cd7073b3529429c9bc", 0x80}, {&(0x7f0000001440)="82731ddc9c6ad3e73b05b3f74ac17878ccf14c659faae87e818a8b582316f3d7d7c12aff27b4c8f078a37b655aca185092d3c34e966528055537f57702838671156d098eba05d66f7eeee2d549322a35bde0d4b98645f8cf0c79a9e778ad2ea90145e4", 0x63}, {&(0x7f00000014c0)="d0a432d9423f575ef0d1af33bc87e9f346b14675366edb77512fe196d12f088c065ae9", 0x23}], 0x8, &(0x7f0000001580)}}, {{&(0x7f00000015c0)={0x2, 0x4e24, @rand_addr=0xd7c}, 0x10, &(0x7f00000028c0)=[{&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000002600)="8ae2dac27c62b2fa7bad6743d3ab9dd0b729147559e3e4098a63733b7c5e7320ea68b060c1fdc2e6d293809721524f5630548956bfe9fc8d09edfdfbdf83beb5e48ea12bc1ecedce2eb23c9dacc7c9d64c3fb07305e97878c9d7f25fc29bf849e56f1ea5696af6dd3bf9379f01030b0f0f1b2bd3df025b0aba6c765915b5406cb8b9ebe40b9cfefc8e135a10600e804d881707f9c0453ef93d8ef1670dc5458ad6fffb0d55ec428187d89cba6d3d7ea2f015a03b626e69143d384869f3d1276275a126d275400059bc90aab117bc013451474b3bfceedecb2744904fb097ebf7efcfc3d7e56bacdb75acbe7fb07eda3a5077db8a1d69068d743ce781e870f2", 0xff}, {&(0x7f0000002700)="6e89da1b108e82f861ffbf4da0e3404e16c121e273e84282a6fa3571e2842b4f94b31ff9744ae151c2e22991e910", 0x2e}, {&(0x7f0000002740)="b318d4fcc70aa0fa30d43daaca81f27ed24061a8fc2afa381beccce18812bd04cfe389f281b44dc7447c47a61bb7b5afee59910817b184154af74444c828aa5a8c9ca2e506628411f7061a90328e1faf628b8fec93404c536eb34a45250b82f76f64fa4bd140a1526a98db5b5a5448b7ecd2cf4dabaa64f7222c9f70744fda2b791673474f5e79c8567e233f477110d97cf7a1316798f094aa12824d1132432cf2d406cd73f1", 0xa6}, {&(0x7f0000002800)="59394f987d88b216f3180d31b3ea8c605e284ac29e0ac1cfcd7d72da223c78dcfac97a1ade78c3af45c2689aefad3d18bfc8cd99a3062c8bbb33429368d0c5e7459db3b5e4f9faa6a3e45ed3451f88ee118178e9ccbac1703310848779c2a673fe64a3edbee7b81e1b647b4aaa469f20bee87bc41c4134b0435ad755f487fd58d9ffcb6b6aed80803196846d2e1b909af019175d44cb2b08d23d9a927a24c092", 0xa0}], 0x5, &(0x7f00000029c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffff7ff9}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @loopback, @dev={0xac, 0x14, 0x14, 0x3e}}}}], 0x68}}], 0x2, 0x48044) splice(r0, 0x0, r3, 0x0, 0x7ffffefe, 0x4) [ 213.294870][T13356] IPVS: ftp: loaded support on port[0] = 21 10:39:37 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x89f0, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5452, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x5e) 10:39:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x9, 0x0}}], 0x1, 0x10000, 0x0) 10:39:37 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x5460, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x301000, 0x0) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14) sendmmsg$inet(r1, &(0x7f0000000480)=[{{&(0x7f0000000080)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000440)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @broadcast}}}], 0x20}}], 0x1, 0x40000) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = fcntl$dupfd(r5, 0x0, r2) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:37 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xae01, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x78) 10:39:37 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:37 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xb704, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6364, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 213.687478][T13424] IPVS: ftp: loaded support on port[0] = 21 10:39:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x480400, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r7 = fcntl$dupfd(r6, 0x406, r2) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:37 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6609, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xfe0) 10:39:37 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xa, 0x0}}], 0x1, 0x10000, 0x0) 10:39:37 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x400454ca, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x69) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x14000, 0x0) setsockopt$netrom_NETROM_T1(r5, 0x103, 0x1, &(0x7f0000000100)=0x9, 0x4) 10:39:37 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x660c, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:37 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40046629, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 213.982283][T13479] IPVS: ftp: loaded support on port[0] = 21 10:39:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x200004cd) 10:39:38 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:38 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6611, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:38 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40049409, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:38 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0xc) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:38 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6612, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:38 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40086602, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:38 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xb, 0x0}}], 0x1, 0x10000, 0x0) 10:39:38 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0xff}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) syncfs(r5) syz_open_dev$ptys(0xc, 0x3, 0x1) 10:39:38 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r7, 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000080)=r7, 0x12) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) 10:39:38 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6628, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:38 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40086604, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 214.473091][T13559] IPVS: ftp: loaded support on port[0] = 21 10:39:38 executing program 0: socket$inet6(0xa, 0x1, 0x7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x5, 0x40000001) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000080)='vcan0\x00') r5 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) ioctl$KVM_GET_XCRS(r5, 0x8188aea6, &(0x7f0000000100)={0x2, 0x4, [{0x8, 0x0, 0x100000001}, {0x401, 0x0, 0x81}]}) 10:39:38 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:38 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x890c, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:38 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40086607, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:38 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xc, 0x0}}], 0x1, 0x10000, 0x0) 10:39:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f00000002c0)={0x6, @sliced={0x1, [0x8000, 0xf94, 0x5, 0x1, 0x8, 0x4, 0x1, 0x7, 0x7ff, 0x5, 0x0, 0xc9, 0x9ec5, 0x4c, 0x0, 0x8000, 0x9, 0x2, 0x1, 0xbc8, 0x401, 0x7, 0x1, 0x5, 0x1, 0xfff, 0xffff, 0x0, 0x9, 0x3f, 0x4, 0x80b, 0x2, 0x7f, 0x401, 0x89c, 0x80, 0xbc, 0x0, 0x8c00, 0x401, 0x20, 0x32, 0x66f, 0x8, 0x2, 0x5, 0x9], 0x8000}}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_REG(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="0000002111eeedaa906b9aef4ae6e527f87ea5879a33e25a8b6222a564d645788da5d1b7ab4fd3a1f82665c506d651678c595c250415d89311fa8334cbfbfc0e24007eadd06c96cfd0280cb7daac8853591b2396d511af76592d3b24dfe671082b09e2ad33478a8e78ecd83cb3e123126f240e5a4f078db189035f202528fb995700bf81c6c0f72d711a4442e5b759fd1e0bbe10c1579376c0a9768a7002c568971fd381101e84307d16b402f1c29b8a0a8b99bf86e5087990d3df406ac552ed034946a8daaaf0451a4bcb0b2acb24cdef9cfdf293efa4268bf3a2093253101db5", @ANYRES16=r5, @ANYBLOB="004999c0c0560c4ec62dbcaa00dc1365e9f24431f00f6297ff2dbd7000ffdbdf251f00006b2700920003"], 0x30}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r6}, 0xd) 10:39:38 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x8912, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 214.731292][T13608] EXT4-fs warning (device sda1): ext4_group_extend:1782: can't shrink FS - resize aborted 10:39:38 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6609, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 214.788703][T13615] IPVS: ftp: loaded support on port[0] = 21 10:39:38 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:38 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x8914, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:38 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40087602, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) ioctl$LOOP_CLR_FD(r2, 0x4c01) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) 10:39:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xd, 0x0}}], 0x1, 0x10000, 0x0) 10:39:39 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x8933, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:39 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) 10:39:39 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4008af04, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:39 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000140)) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) r4 = socket$inet(0x2, 0x2, 0xff) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000200), &(0x7f0000000240)=0x4) getpeername$l2tp(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f0000000100)=0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000280)={0x0, 'vcan0\x00', 0x4}, 0x18) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet_udp_encap(r5, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) r6 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:39 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x400c6615, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:39 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x8953, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 215.215805][T13687] IPVS: ftp: loaded support on port[0] = 21 10:39:39 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:39 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x8982, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:39 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x374, 0x4, 0x4, 0x200000, 0x80000000, {r5, r6/1000+10000}, {0x3, 0x1, 0x6, 0x6, 0x7f, 0x0, "71c247b6"}, 0x9, 0x4, @offset=0x5, 0x2, 0x0, r7}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) r10 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r10, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) bind$xdp(r8, &(0x7f00000001c0)={0x2c, 0x18, r9, 0x30, r10}, 0x10) r11 = fcntl$dupfd(r4, 0x0, r2) connect$inet(r11, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:39 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40106614, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xe, 0x0}}], 0x1, 0x10000, 0x0) 10:39:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x10}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:39 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x8983, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:39 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40186366, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:39 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/fs/smackfs/change-rule\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x20003, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x1}}, {@privport='privport'}, {@version_9p2000='version=9p2000'}, {@fscache='fscache'}, {@access_user='access=user'}], [{@smackfsdef={'smackfsdef', 0x3d, 'cgroup['}}]}}) r6 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:39 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:39 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:39 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x401c5820, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:39 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) write$smackfs_logging(r4, &(0x7f0000000080)=0x1, 0x14) 10:39:39 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x89a0, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 215.827614][T13780] IPVS: ftp: loaded support on port[0] = 21 10:39:39 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4020940d, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) recvmsg$can_bcm(r2, &(0x7f0000000800)={&(0x7f0000000200)=@xdp, 0x80, &(0x7f0000000780)=[{&(0x7f0000000280)=""/144, 0x90}, {&(0x7f0000000340)=""/232, 0xffffffda}, {&(0x7f0000000500)=""/134, 0x86}, {&(0x7f0000000180)=""/19, 0x13}, {&(0x7f0000000440)=""/54, 0x36}, {&(0x7f0000000840)=""/195, 0xb7}, {&(0x7f0000000680)=""/205, 0xed}], 0x7, &(0x7f00000005c0)=""/38, 0x25}, 0x40) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x47e, 0x6, 0x9, 0x1, 0x1, 0x80002, [], r6, r3, 0xfdfffffc}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x41, &(0x7f0000000080)=0x84, 0x4) 10:39:40 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xf, 0x0}}], 0x1, 0x10000, 0x0) 10:39:40 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x89a1, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:40 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={'\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) socket$inet(0x2, 0xa, 0xfffffffb) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r6 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0xfff, 0x800) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r6, 0x80dc5521, &(0x7f0000000140)=""/237) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:40 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40286608, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000180)={0x4, 0x6, [{0x4, 0x0, 0x8}, {0x7ff, 0x0, 0x3}, {0x9, 0x0, 0x663}, {0x3, 0x0, 0x80}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x77) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x3004000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_MODE={0x1, 0x33, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfffffff7}]}, 0x54}, 0x1, 0x0, 0x0, 0x40840}, 0x8000) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200)=[r3, r0, r4, r5, r6], 0x5) r7 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r8}, 0xd) [ 216.188129][T13844] IPVS: ftp: loaded support on port[0] = 21 [ 216.191918][T13848] EXT4-fs warning (device sda1): verify_group_input:132: Cannot add at group 14 (only 16 groups) 10:39:40 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x89e1, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1, 0x1}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r0}, 0xd) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) mount$overlay(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000080)='overlay\x00', 0x8000, &(0x7f00000002c0)={[{@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}, {@metacopy_on='metacopy=on'}, {@lowerdir={'lowerdir', 0x3d, './file0/file0'}}], [{@fowner_gt={'fowner>', r2}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x36, 0x66, 0x33, 0x37, 0x65, 0xa, 0x64], 0x2d, [0x37, 0x39, 0x66, 0x63], 0x2d, [0x38, 0x33, 0x64, 0x62], 0x2d, [0x66, 0x65, 0x30, 0x39], 0x2d, [0x33, 0x31, 0x34, 0x38, 0x62, 0x38, 0x32]}}}]}) 10:39:40 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:40 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:40 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40806685, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x10, 0x0}}], 0x1, 0x10000, 0x0) 10:39:40 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xae01, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xae41, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 216.474262][T13898] IPVS: ftp: loaded support on port[0] = 21 10:39:40 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6609, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:40 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r9, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1b4, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x96, 0x2}}, @NL80211_ATTR_FTM_RESPONDER={0x134, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x3d, 0x2, "d84787cbd77d293fc48d970b53fc9dbb0c448d13c81fc673b9c3ec74c03d70ef0255e2c83cac4a9d79cf922061557557cee527340e383aed3d"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x86, 0x3, "4a94bf106bbe3436843a23c00c1c8a5cccf8ca7763088481497467c3d1e9d6da04f86b83a56a3841a3b3101e337e56fac74ea1d32672e3dad1355c37c5662593367133a75bc5a5371cfd6c4b944bf38da98785a68203e02225d04c4f7339af0e2b4c3a80979a7eaafecf27a48b31ab09492a3ddfd2e1828212b8611f89096ba1c3d0"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x56, 0x2, "e61c919577aeee2969c6b84d87eb85d14d331ab2ee3334dba8f399914e0beee4b2f2c87b043c77fb9432167deb2c8b124d3ec2c6ad26d0ae4923b551914e624f08c34cbdd50575851e13d8f7e4f7d54a4358"}]}, @NL80211_ATTR_MAC_ADDRS={0x34, 0xa6, 0x0, 0x1, [{0xa, 0x0, @dev={[], 0x42}}, {0xa, 0x0, @remote}, {0xa, 0x0, @remote}, {0xa, 0x0, @broadcast}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_SSID={0xc, 0x34, "cc8ae448a29e9527"}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x9f}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x2004480d}, 0x4000) write$smackfs_ipv6host(r1, &(0x7f0000000100)=@l1={{0x8001, 0x3a, 0x3, 0x3a, 0x3, 0x3a, 0xffffffff, 0x3a, 0x20, 0x3a, 0xffffffff80000000, 0x3a, 0x1, 0x3a, 0x1000}, 0x20, '@eth1'}, 0x9e) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:40 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x11, 0x0}}], 0x1, 0x10000, 0x0) 10:39:40 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xae60, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000007c0)=ANY=[@ANYRES32, @ANYRESDEC=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x3}}, 0x20000814) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000000012fe28baa93d87ace5845526000000", @ANYRES32=r3, @ANYBLOB="08000200ac1414bb08000400ac1e0001"], 0x28}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0)="4fe91974005eda9f232632e766c5c095260262cb4133a850ee74747c23f2ea903868e7654ab6966508af4d7c53c2d28a36d13b58f283e9899afac8c625f637d1bebc969ab841122c44eded0c0aae6770acfb994e6334f79b6b889357ff3d9abb0faf7fd235c8099ea95fea0026a09dba049b032d76f67dca836effeaba146c663574a4b85be6a72e141b3a4c0e4d040c0a098dd666baea41f57c7f089d4be90b038b4733fb0e87c31bc94b480ce35f40a4bf6b7e609b394a882644219786f7817fde838370b68dcbf0374142271fb876279b0f8122", 0xd5, 0x1, &(0x7f0000000200)={0x11, 0x1, r3, 0x1, 0x7, 0x6, @random="721e080bdb86"}, 0x14) r4 = fcntl$dupfd(r1, 0x0, r0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x2, 0x3, 0x4, 0x70000, 0x7fffffff, {0x0, 0x7530}, {0x5, 0xd, 0x3, 0x6, 0x4, 0x6b, "104b63c9"}, 0xfffffeff, 0x2, @offset=0x6, 0x400000a0, 0x0, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000000100)=0x9, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$KEYCTL_MOVE(0x1e, r8, 0xfffffffffffffffc, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x90, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r7}, 0xd) 10:39:40 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x80086301, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xae80, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 216.687468][T13934] device bridge2 entered promiscuous mode [ 216.755364][T13951] IPVS: ftp: loaded support on port[0] = 21 10:39:40 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$bt_sco_SCO_CONNINFO(r5, 0x11, 0x2, &(0x7f0000000100)=""/115, &(0x7f0000000080)=0x73) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:40 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r4 = socket$isdn_base(0x22, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r8, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) sendmsg$inet(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000080)=[{&(0x7f00000002c0)="dd259e4b8e64f092a286abe5cc114b77a1ec3459dc47a5779bb37b5b199dfc0d7a1be364853f3670937c2712bbf50bb7a8d468ec522a365823f47049b5a3b045e42cd13e1fe353c9b28e7841c3db37007aacc922649cf0bcb616f725b6945ac59891c33dd7b6610d16ac6bcd2a97e50b1f51e1f0b8023f570dbc2a9baaf75358ff8284dd3b19b72c87630375149d21ddd121bb452f8c5006cc28b45c63e706b27bdefb4d7a1d93d7f97558a046f8e73125977616f3fe0f25fe191852dceeff4a0a", 0xc1}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="110000000000000000000000010000370300000000000000140000200000000000200000010000000800000000000000580000000000009000000002000000000000000094040000072bb6000000c300000009e0000002ac1414bbe0000002ac0814bbe0000001ac1414aa7f000001ac1414bb01940400000000001c000000000000000000000008000000", @ANYRES32=r8, @ANYBLOB="ac1414bbffffffff00000000cc001f00000000000000000007000000072b40e0000002ac141415ac1414bbac1414bbac141414ac14144400000081e0000002ffffffffac1414bb4410b2a000000685fffffe0000000000443ce771e000000100000001e000000100010000ac1e000100000200ac1414aaffffff010000000000008000ac1e010100000006ffffffff00000002004410d4607fffffff0000000000000003861900000001050aa26784c960e720aa070983a097a1ed6512890f43e0000001ac1e010100000200940401009404000094040100000000001c000000000000000000000008000000", @ANYRES32=r9, @ANYBLOB="00000000e000000200000000"], 0x18b}, 0x40800) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:40 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x400454ca, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x80086601, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x80086603, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:40 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) fcntl$dupfd(r3, 0x0, r2) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x2}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:40 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x12, 0x0}}], 0x1, 0x10000, 0x0) 10:39:40 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40046629, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 217.029238][T13995] device bridge1 entered promiscuous mode 10:39:41 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 217.145315][T14020] IPVS: ftp: loaded support on port[0] = 21 10:39:41 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x80087601, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40049409, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x800c6613, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) fcntl$dupfd(r3, 0x0, r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x2000, 0xda3, {0x77359400}, {0x5, 0x1, 0x20, 0x81, 0x3, 0x4, "3207089b"}, 0x5, 0x3, @planes=&(0x7f0000000180)={0x2, 0x4, @fd, 0x4}, 0x1, 0x0, r0}) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x40, 0x0) r8 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r8, 0xc0585605, &(0x7f0000000280)={0x0, 0x0, {0x57, 0xfffffff9, 0x301a, 0x9, 0x7, 0x1, 0x2, 0x3}}) r9 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000200)=0x8, &(0x7f0000000380)=0x2) ioctl$FITRIM(r9, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$UDMABUF_CREATE_LIST(r5, 0x40087543, &(0x7f0000000540)=ANY=[@ANYBLOB="01ffe039", @ANYRES32=r6, @ANYBLOB="0000000000000100000000000080000000000000", @ANYRESDEC=0x0, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="0000000000f0ffff000000000040000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESDEC], @ANYBLOB='\x00\x00\x00\x00\x00@\x00'/20, @ANYRES32=r0, @ANYBLOB="00000000000000110000000000f0fffffffffffff99509e523a61a293214122fa1dd735244696e4f543c29258216b80eb0c25958599b2cd3cb293aedc6151bcef60d22f0ba85e52c4897eb23dff52c6c9bb3d31cc29e391ce14a61ac13f1288bf1446492bb303a7a816d737fbffeaf987590302e5db6b947726626d4b5cb78a0026376d9c0f93f57aafda188a0a1dc1e8ebf1fd298fd9eb55be007e000acac1d7921ca34668306da8d16e7ae78c89269291b4af7787a66c55f040e759e06a8a58c20abbb312e4cfdbd92acab446bc9b31b", @ANYRES32=r1, @ANYRES32]) 10:39:41 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x801c581f, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:41 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4004ae99, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000080)={0xf740000, 0x80, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9f0902, 0xffff, [], @value64}}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, r3}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000200)=""/117, 0x3000, 0x800, 0x6, 0x1}, 0x20) 10:39:41 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x16, 0x0}}], 0x1, 0x10000, 0x0) 10:39:41 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0045878, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:41 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0045878, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40086602, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kexec_load(0x2, 0x5, &(0x7f0000000680)=[{&(0x7f0000000180)="c3f3abb340b7b69992db30efa4f705f44132a513806aaf5c35192f076039fe757335e8e07cad122d126fa4db87f476a18de7356931b9d926802b5fc9d100b6fc5bb4520c16711f76b71b93ba13b3f66931d589b3f0d08bc43fa0c0481c9052e2bc690aed8d110f95edd7b1ef313d92d433d07325723059953211f4e038b8c4d5c0aedba98a613c0c4cd33ef770bc116a60fa8c3ceb1a9a3c4fb4c65458847a916e23b0c81469c55e3248f134284052861ca24b97814364584aacdc2a395e6535fadcef63ce142be8d8", 0xc9, 0x5, 0x8001}, {&(0x7f00000002c0)="e7dca5daeea6ee7eb0fd06c506a7569b2f8008854a90bce0f2c074f20d6bd9a4d08b8b21f184e1286ac6d9fd9d532865442a98d5e4161105b98c15b08268c41ff902fb2a2fbba140aa271850ee2c430b33eae7ecab9f4d8bad5fad81b2589134e67b29ab8b4d39ec51159ec30f6c9fc6ea28594cb3472992d86f4b45dbe006130ab2722397dfd0e095a48d515246d60e1b791727ee727657c1caf0771093799a20e3bbd1e9c94a6eadbaf4e51f4f2bc6692dd001ae23421c83353315fbb6203e85385235e8f0a4093efb9cff69b9cbbd15d7b48c88e9ac1d57c7165f2feb1cbda623d8673b788520c711482d223c3de4", 0xf0, 0x0, 0x7de8001d}, {&(0x7f00000003c0)="0eeba5895d85a23a019706b4fa7c7cc8f039fb33640402c6f693a998a62a7d28d99259140cd9ea2242987261b4195888457112cf2fff768b90dc46294afa47dd5d36fdeb7f339537459a6539e739dbc9b35fc1776181d5eddfc90638f3cdf4262f307b7804eaeaa653f032db4ae55dab39ea58790f1ea22661c65217f53726ae3617e0b801185716255c9c", 0x8b, 0x7f, 0x3}, {&(0x7f0000000500)="d6d4d6d73264d3b0866a5093472e4fab74cd35ffd8578c408bc8335360ad71bdc00f3aa12a4f510805ecea582fcb7f23f918dee9862112283fb43c54e5effca49a7370d026b35a8a5682557774d4a57afeff1331214dbdfc2b5294fa8a576db618f4fae1bb53946c9779a8ece6e548e3a8aea99a4ee0aea1aa3cd7e1299dfa1a960c9bfb2442a01417b818a400508be87f94341a4371ad10efdb5a22838e3d4c2b703fe5e30ae2f77eb0d3f14e3d088d64ac866ccbaaf75e2530b65d630ddcc9ce0003bffe3b62cc958f049b65076f549eddd0cc3f9b", 0xd6, 0x1, 0x10004}, {&(0x7f0000000600)="25e8b5be027bc575796b9400cb90289f4fb4495f8bf361afb59d172a5cd0b1714de45ebd3a91bfa8c6be5eb47c81feed27c65fa7dee470513d3ee67cdb59d47ab6b131e9c12707f1dfdeade65e0ed6adfeb196ee17f32d46360c77f412fc686324c5662825", 0xc4, 0x5, 0x1788}], 0x0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$update(0x2, r2, &(0x7f0000000480)="b3169fc3be0263dfef852187506a0773", 0x10) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) sendto$llc(r3, &(0x7f0000000740)="a5f8cd3da17a164cc52d301a549cd0c2de90ae40b1355d25c992f27a3a25a0f0e92b1f1f5721348d341c4fc63652d8612e2f6d7bee3fe11b26de9a9c54767decb7b2dbdc248e0d423b44c7cbc1578c53c10ba35fb86550083e8f6920bec21eefb6202001ef985a5372951b8321bc55e80983b350a4afcc341940ca1a985dc0f99c728488ef19c2479c9978d581a0e1672acb089d835443effc", 0x99, 0x240080c4, &(0x7f0000000800)={0x1a, 0x110, 0x3, 0x80, 0xd9, 0x2, @random="251c37bec5c5"}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x101, 0x1, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x40000, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x83000, 0x0) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r6) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, r6) keyctl$negate(0xd, r6, 0x1000, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:39:41 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r7) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, r7) r8 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r9 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r8) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESDEC=r5, @ANYRESOCT=r7]], @ANYRESOCT=0x0, @ANYRESHEX=r9, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES32, @ANYRES32, @ANYRES16, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16, @ANYPTR, @ANYBLOB="4b9a437993013591dbda96c8685420c61095c27992fbddf6132d018986a270f434a1fdd5", @ANYBLOB="8c806bc87522608b3e594b90181bcdf6230db22ac733acbe15955ecda49293292acca8fbec496eb36d709b4d3b5a54c4aaf1ab9f73479c60d4679efde82994eaf28171a58c0c5f3146d2ad94292dc4750f379e9c20227ff111cfeb9012d879755963502baa4f825e9213c618ab048c3b13956d44f8b04bdacc3d352c657951be5e2543b8f761518f1743b99b7f4b0aaad2a0e131ef4b16f350bd475719634a2a1b782635731a9d85c0e884cd74cfa843a60f64ff163453cbdf2c3c97c615476370973ad6f33e6cdf4687ce6053abf9e4637b002a9af9a78d659f10e060e03feaec6bad6a2f25a26249965cecc8c6d0ca3af9eb2c5429", @ANYRESHEX, @ANYRES16, @ANYRES16], @ANYRESHEX], @ANYRES32=0x0, @ANYBLOB="af913e2f25ee6956ad4f06897298ffe43195deaf0e2bb2efee3fb26d014833ff4f953bd3b5f0af96133e01f1d23d4dc315dd3aceb8c9c30900000022502ec531cf54f0bdf8f5116c2022b2c1d66cc53f99330b467c33a253a725d5697343293dec57d0e977048415bd3d6694dbaa1bcba4e1d8e90685dddc9e6579aced0daf24a6a50190177e", @ANYRES32, @ANYBLOB="435fe1e7c04c30d6cfc27bb0c29c0e1c41bc5b4890e83701de88b75c106cfe1a911bd6b13382d6527108c1e7ef63cb4f3771141e746e068618c62b15a0db3a01", @ANYRES32], 0x10b) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r10 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r10, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000080), 0x0, r10}, 0x68) [ 217.692893][T14105] IPVS: ftp: loaded support on port[0] = 21 10:39:41 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0046686, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) ftruncate(r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:41 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0096616, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40086604, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:41 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x25, 0x0}}], 0x1, 0x10000, 0x0) 10:39:41 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40086607, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x1, 0x4) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r4, &(0x7f0000000080)={r5, r0, 0x10001}) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) dup3(r3, r6, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r7}, 0xd) 10:39:41 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc010640b, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:41 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r7 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r8) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xa9, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x78) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f0000000240)) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) fsetxattr$security_evm(r6, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "38c05cb969705174701dcbac24b91b84"}, 0x11, 0x3) splice(r4, &(0x7f0000000380)=0x72d2, r5, &(0x7f0000000100)=0xfffffffffffff0a0, 0x2, 0xf) [ 218.018782][T14167] IPVS: ftp: loaded support on port[0] = 21 10:39:42 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 218.099199][T14179] EXT4-fs warning (device sda1): ext4_group_extend:1782: can't shrink FS - resize aborted 10:39:42 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:39:42 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6609, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:42 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:42 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x3}}, @NL80211_ATTR_MAC={0xa, 0x6, @multicast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x8080) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:42 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40087602, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:42 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:42 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x29, 0x0}}], 0x1, 0x10000, 0x0) 10:39:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xcd1ee2fc3f520a25, 0x0) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="002d96316e33020ef5e60027bd7000fcdbdf25020000000900010073797a31000000002a00030073797a3000000000140100000000000000616e30000000008126bf81"], 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x81) ioctl$SIOCX25GSUBSCRIP(r4, 0x89e0, &(0x7f00000002c0)={'netpci0\x00', 0x1c089f64, 0x10000}) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:42 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0189436, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:42 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4008ae89, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:42 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020660b, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 218.493456][T14243] IPVS: ftp: loaded support on port[0] = 21 10:39:42 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xfffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x4}) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f0000000040)={0x1, 0x1000}) prctl$PR_GET_FP_MODE(0x2e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r7, 0x1, 0x0, 0x0, {0x25}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x3}}, {0x8}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_GET(r5, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x30, r7, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x30}, 0x1, 0x0, 0x0, 0x48014}, 0x404c800) 10:39:42 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4008ae90, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:42 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc028660f, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 218.677911][T14272] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 220.950699][T14320] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 10:39:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2f, 0x0}}], 0x1, 0x10000, 0x0) 10:39:58 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:58 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4008af10, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:58 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0406618, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:58 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0x7, 0x4b, 0x2}, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:39:58 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) fcntl$dupfd(r3, 0x0, r2) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$llc_int(r4, 0x10c, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x3, @multicast1}, 0x10) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000140)) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$CAN_RAW_LOOPBACK(r5, 0x65, 0x3, &(0x7f0000000180), 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:58 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0406619, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:58 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x400c6615, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 234.629494][T14383] IPVS: ftp: loaded support on port[0] = 21 10:39:58 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101080, 0x0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:58 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) mknodat(r3, &(0x7f0000000040)='./file0\x00', 0x10, 0x8000) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:39:58 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40106614, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:59 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x30, 0x0}}], 0x1, 0x10000, 0x0) 10:39:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @broadcast}, &(0x7f0000000100)=0xc) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40186366, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:59 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0506617, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:59 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400204) mkdir(&(0x7f0000000280)='./file0\x00', 0x41) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) [ 235.173904][ T312] tipc: TX() has been purged, node left! 10:39:59 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc080661a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x401c5820, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 235.236788][T14465] IPVS: ftp: loaded support on port[0] = 21 10:39:59 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x2, 0x1, 0x0, 0x0, 0x401}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0xfffffffd}, 0x40) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x34, r5, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x20, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) [ 235.300148][ T312] tipc: TX() has been purged, node left! [ 235.306366][ T312] tipc: TX() has been purged, node left! [ 235.348117][ T312] tipc: TX() has been purged, node left! [ 235.376523][ T312] tipc: TX() has been purged, node left! [ 235.387610][ T312] tipc: TX() has been purged, node left! 10:39:59 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 235.405134][ T312] tipc: TX() has been purged, node left! [ 235.419245][ T312] tipc: TX() has been purged, node left! 10:39:59 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0945662, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4020940d, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r4) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000200)={r6, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r7 = fcntl$dupfd(r3, 0x0, r0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000300)={{0x1, 0x0, @descriptor="e336253226b47330"}}) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$KIOCSOUND(r8, 0x4b2f, 0x9) socket$inet_sctp(0x2, 0x5, 0x84) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000003280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000003240)={&(0x7f00000030c0)={0x14c, 0x0, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x4}, @ETHTOOL_A_LINKMODES_HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:59 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x3a, 0x0}}], 0x1, 0x10000, 0x0) 10:39:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r5) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000200)={r7, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000040)={r7, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x7ff, 0x4, 0x1, 0x8, 0xcf, 0x5, 0x8001, 0x0, r8}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:39:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4020ae46, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:59 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0c0583b, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 235.590360][ T312] tipc: TX() has been purged, node left! 10:39:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000100)=[r1, r4, r5, r1, 0xffffffffffffffff, 0xffffffffffffffff, r3], 0x7) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) recvfrom$phonet(r1, &(0x7f0000000180)=""/67, 0x43, 0x10020, &(0x7f0000000080)={0x23, 0x8, 0xdb, 0x54}, 0x10) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:39:59 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 235.648241][T14529] IPVS: ftp: loaded support on port[0] = 21 10:39:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40286608, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 235.731646][ T312] tipc: TX() has been purged, node left! [ 235.739273][ T312] tipc: TX() has been purged, node left! 10:39:59 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0xffffffff000, 0xb}) [ 235.791066][ T312] tipc: TX() has been purged, node left! [ 235.806010][ T312] tipc: TX() has been purged, node left! [ 235.825361][ T312] tipc: TX() has been purged, node left! 10:39:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40806685, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000080)=0x9, 0x4) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 235.851157][ T312] tipc: TX() has been purged, node left! [ 235.862876][T14570] EXT4-fs warning (device sda1): verify_group_input:132: Cannot add at group 14 (only 16 groups) [ 235.877481][ T312] tipc: TX() has been purged, node left! 10:39:59 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:39:59 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000005e, 0xb}) 10:39:59 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x44, 0x0}}], 0x1, 0x10000, 0x0) 10:39:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) openat$smackfs_syslog(0xffffffffffffff9c, &(0x7f0000000080)='/sys/fs/smackfs/syslog\x00', 0x2, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) signalfd4(r2, &(0x7f0000000100)={[0x3ff]}, 0x8, 0x80800) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r3, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r7}, 0xd) 10:39:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4090ae82, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:39:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='veth0_macvtap\x00', 0x10) r5 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:40:00 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4138ae84, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 236.039503][T14595] IPVS: ftp: loaded support on port[0] = 21 [ 236.055196][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2}) [ 236.111169][ T312] tipc: TX() has been purged, node left! [ 236.118539][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:00 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$P9_RSETATTR(r5, &(0x7f0000000140)={0x7, 0x1b, 0x4}, 0x2e) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCL_UNBLANKSCREEN(r6, 0x541c, &(0x7f0000000100)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:40:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_netfilter(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)={0xa20, 0x2, 0x3, 0x201, 0x70bd27, 0x25dfdbfe, {0x5, 0x0, 0x5}, [@generic="62a9a40ff8893c55ca82da570c43a5a6e11c406996c83f09bc255cd6e270bff3ca2556c8cdae6cd6e3c7f7673613704e53f21ae4a41b83d473a276193e8fd462ae2d30d71b66e3aefef23908d9766edf623e1178", @nested={0x1c5, 0x49, 0x0, 0x1, [@generic="515ee16994c7b055a2c408b4796718b523b162f7529f58cabecb8bead810be270f0895d41eef5a8b90eb5ca3e4c987a10aec4e162374533a46c19c3e48c909e4797f7e58c8fcc9f1f0b07f8509c2a87f76efd7cb10af350a0697346a2a95e54cde9f3686d8fecd224b089618bbdb034ea4d9c11b321fd06e89b46e2887c3835977f6ca697a34b9f2ea39667e62e3a84863d3662339bcf5d994099d31e25a11ff36c8079d6583c2b8670eaeb6f7b28cf80abc22c34bfee95957", @typed={0x8, 0x79, 0x0, 0x0, @pid=r5}, @typed={0xfb, 0x3b, 0x0, 0x0, @binary="2be5f3d1501789162e5fa7f4300a2894bc153940bbb24c1a79c8ab54e918eb04b5d62f1be0e2f943a648840f15c4229c745025147fe7c1f3b00743025cdfe298d18767769304eef83657fbe7fc659ab8d70329013219c8ad2c898b1f7d943a927a7c3ba7dd6d3706bac3f2219cc48013bb1a2b780d0733254d7f3ae12c1984d27a328749ff126219554793192475e87191c8d4477469ecd3e9c0f04f19fc47d5da51cf8b69b4e4d13387f69abf7806a6c0712de977eec709ebaade574a8c5241c648d67ffdc0c0589b75baae18291c82ce260d743cd6c333a0da131cb621f63f027961fddf59ee2b60f99e5562af5d1b9b2aed8c025ce2"}, @typed={0x4, 0x63}]}, @typed={0x8, 0x2f, 0x0, 0x0, @u32=0x6}, @nested={0x245, 0x30, 0x0, 0x1, [@generic="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", @generic="963f06b57617a19ef8cc78309e26bafa7345b091e5c36a9b0f31589f3403fdb70b76670f733efc3166ef82eb7aefc3622f3f7ca6fde17048f302d31dd5c4b96917d9713e50e0ca3225bffc4b85ca605ae912eae488233a40857945953d542f1a396f95971a3ace964a68dcc6c0eee2b7f4cfe7764d038c901e56f7c3d4a4ed4d0220c3e5e3c0b8825579a00ef11942d2c5269498c6db33f6827609320be60c1e2d9f9452b2789b3548260d4dbbcc4d8e8077520dde4fd9bf7df2e8ae4a72154a7f7c7629f16b2f146899ac18569cdf", @generic="0864bd6341acb3856c65fc9ea8be3b70d2ff3a39c3ba5bce3e45ae0b171e62b1c7c77e5cc0ceadedb655d3feffb0251b7466383b274a0114f7eb3dee8f6286b73645b7ef799f7e52bba39097c40f5d22a2cc2c10b1f69d6b142e84a4df0f69", @generic="a02c925e250047e49275e1e57e92b831f9ff663df1e16058"]}, @nested={0x6c, 0x19, 0x0, 0x1, [@generic, @typed={0x68, 0x8c, 0x0, 0x0, @binary="22829bafc70d731d195a0efc5c396081ad179520a7099608a3a1e4f3c4a777db24fe5cd5498bbc96acb38d76d52ac6328685a2c3f7193cd1a5f8e1a3eb7fcb41d40d16dd160ab89128447efb35431b511b36f5ec70643e935ef4ce32f8da2ac8489035a0"}]}, @generic="8e8fecc95f3ccf08e47124fcaa675d0c084a7fded78f7ff92f83d27a67306ff774e394833c8b585b5e76ec9d15e41af4daa15442e2e1d80359063edc7b17c0052f570a4681d3dab8cbf223159a47b7d8394a27121ad256b414bbdcb69c6a62fdf4916ed92e76664cbd0483ef147b03efdcbf54", @generic="2a9482d33d61fdcd4bcfc4a371a97e74d4f6e9f92eb95f035684a4780c40dc934a78054af706462cd9bc6fd1dbbcc2b69fac7e19ea8528cd4cf98e9f5003989285e40a38d5844a9fc6630c9a7aaf41d3218eb2a29608eb046e400850852ed20a6d2451024ebc898004de2b044587694b6a0d30442826c05fb8c9cb8e842ee1f7e4cf28590e7bd541d2bf88f880bf0c64da8efe79f036926bf371f5e4098dd7515512dba997b894704291028ac18910e3768c185d2266cc1aa90a2dbd0aa2d1f757a5eadeed3faaf334f3b457933cf12d", @typed={0x4, 0x2b}, @nested={0x3e9, 0x95, 0x0, 0x1, [@generic="1670fe72502cafb6d7a325b75060ac1fdc827e6a20b64ab792d8c3bd8aad0b780bce2945a7efb2c736097219c5b76994bc6264596fb164ff16f3d02322cac7e46d2a0f87636d99d2733c8bb30d3df0eb465a7fbbe875519dc9fade57b4a098e82a0766c988ca8eb5449f2ca1fe7cda07f2ed847d664c23", @typed={0x8, 0x6c, 0x0, 0x0, @fd}, @generic="27c722181378804e5d8234bdbcf22a4d3b9cc3029fed6530fdaf5fc9067937631d7e1ce2ad664a9426a4c408411e38276b8e309b486f4eac4e8f99385cc25c445ecf9feef98044a98567e5c74fed267fd84098bd68bce47e3de10ddcec0f1e7da0247292ddcbbfc1860be7bfe01080066150f22fe0542aa7befb93d864b34404cba723f610a08144ca93df26ce18094c", @generic="7738e1f457bdcb2fd187b26412cc90ed510e282f83846bc9883b39ca230c393d6e742d567d854cabb7ee2d1a4b34e4993a213ecb641a0904", @generic="1c21e76c66519218843fd78acda0b8d69eabd7d86813be8a3a06e9c85c001363d012a7fb4edce9d67dab20ab279d52ae66", @generic="0d9e081c90cdadfec1ab97c497634de97dc2c491916bd3864f81b64b917b50d32e48e6a9263bb5474f262d1314b1125f523d706009e19d12a83248496ebd563d999ebf9a729d68d7109e1788c7a2cbc81b0afb2ac56ccf46c69e911b7baaadb9387c8c9116f2fa1323df9c74079f3cac884c20db45aff81876db31d6f5899339a14841bbfec160536cd66a663d058ddc8a998228fda4ab97ae8930fcd513efa593901d23bfe29667bf63c53c0af84ebebd403f5d02b2388ad84b7955d1bbda6b11ad28f8efa7a900a456b0741aebdfabfb0a38948ef713d0", @generic="29817dcd0648e9d0fd383a8a8f1da56476604cb74fe3373c03312ab9b1fe65732c29877c3bb7b04143452e101fc21b6e75d03054f44538ad907ffd678072fe364ad2d453382fd841807907bd714f49600dff311339fe36afaf31", @generic="8bee52ce11918c1a513fc1eec65604e4e0b220c8186b38aacdafe395412a323ab265649f18ee69eee02e827c7922ee04038290bb68b64671bbd76af2c113a25adc2a58d4d8251e588e35b26b706b53bc21b7fa69fe6017c4d4eab890684c51fa8cc998c7aa9cd52dca84", @generic="830b915efd76577bad538763fc4c01a2fdc4a344ab73e3b9ab1cc1509b0cff1f88be1f49b95cf95b330bcd9bf202539faea33dd80809f578e69202a20babbad9598bf3f6afc063755619057e81cac454f506b961a558c9892ddda4a1f2606c87b595823a399e3d5036c1b9aa2cde97c0cb7bbcd6b14989c10515ee2e677678f499076bb4e32f536bb940ba8ac2f0c6bf51918a12081ffeb9d6097b4cbdc0eab61bb9256b9f5222e0b88cdaf63b163f99e6022c823260865528434548d6cc7362ef29f4e6492afb0365d7e6b0a5bf14e84c"]}]}, 0xa20}, 0x1, 0x0, 0x0, 0x24000001}, 0xc000) [ 236.277186][ T312] tipc: TX() has been purged, node left! [ 236.291080][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x3}) 10:40:00 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4400ae8f, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 236.331250][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x7d818a385edd454, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x34, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2c6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x34}}, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000380)={&(0x7f0000000200)=""/70, 0x3000, 0x0, 0x8}, 0x20) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0xa4, r5, 0x1, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x7c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x8, @mcast2, 0x80000001}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000800}, 0x840) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) set_tid_address(&(0x7f00000003c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r6}, 0xd) 10:40:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x48, 0x0}}], 0x1, 0x10000, 0x0) 10:40:00 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000020e, 0x9, 0x20000000000000}) setsockopt$inet6_tcp_buf(r4, 0x6, 0xb, &(0x7f0000000300)="eabaa4a699ff5bd127e8262cb6eaaa728856afd0b97df146ac86089d22439580b042ca50298b524f008942094a684d592eb104461033f93192716f39ae3cc08a74426e7a3bd250c7fa8baffa02266783747ed1b6fe36e201ad7cde50960106677a1ba574f5fa7603175ef08c41787763ae07a51478b22447e6927353b4d95c8b3d0e134acdfa5e9f9ddecc86b5d0ecf4eaa510aa4e95d1b05441", 0x9a) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) io_setup(0xc5f, &(0x7f0000000080)=0x0) io_pgetevents(r6, 0x4, 0x7, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000280)={&(0x7f0000000240)={[0x9]}, 0x8}) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) [ 236.454029][T14662] tipc: MTU too low for tipc bearer 10:40:00 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 236.483496][ T312] tipc: TX() has been purged, node left! [ 236.491051][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x6609, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:00 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x4}) [ 236.534213][T14669] IPVS: ftp: loaded support on port[0] = 21 [ 236.536840][T14672] tipc: MTU too low for tipc bearer 10:40:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x1d0, r3, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x180, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xf281e95a539ba884}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xb}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xd}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}]}, @ETHTOOL_A_STRSET_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x1}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r8}, 0xd) 10:40:00 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x80086301, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 236.628967][ T312] tipc: TX() has been purged, node left! [ 236.636040][ T312] tipc: TX() has been purged, node left! [ 236.661186][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) splice(r0, 0x0, r5, 0x0, 0x7ffffffe, 0x2) [ 236.698917][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x4a, 0x0}}], 0x1, 0x10000, 0x0) 10:40:00 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x5c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 236.756187][T14716] device bridge2 entered promiscuous mode [ 236.762872][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5}) 10:40:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000040)) fcntl$dupfd(r1, 0x0, r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0/file0\x00', 0xe, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 236.830393][T14725] IPVS: ftp: loaded support on port[0] = 21 [ 236.870386][ T312] tipc: TX() has been purged, node left! [ 236.876830][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x80086601, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 236.911743][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet6_dccp_int(r0, 0x21, 0x1, &(0x7f0000000040)=0x400, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x82c02, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x3, 0x4000c0) write$P9_RREAD(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="bd000000750200b2000000b746dfb2d1a76cb449ee86a30c94352d8ba70b1ad5398ddecf8f2a9e2444748f01a959ca2bb76468f82dd531267ef46a6d5e4d4f92e4cc1441fb47c09dd8bc5efa33feb77297b9245c9fb3d0a9b765eaeedec30dc2de2400229833abb3a6da283bfe4b57250060a39cb105005eb544267d99d2903c98bf06ba42a8da3518708c45d7cad9fb6954d4673d02f57dd757fed9b488f2bfddb746d07de56151610a8d5d57bd239597842879b895948d0ff2979286"], 0xbd) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(r6, &(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @host}, 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r5}, 0xd) 10:40:00 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x6}) [ 236.956356][ T312] tipc: TX() has been purged, node left! [ 236.987689][ T312] tipc: TX() has been purged, node left! 10:40:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x4c, 0x0}}], 0x1, 0x10000, 0x0) 10:40:00 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x406, r3) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f0000000100)={[0x5000, 0x100000, 0x2, 0xf000], 0x5, 0xb6, 0x2}) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r7 = shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_UNLOCK(r7, 0xc) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) splice(r8, 0x0, r4, 0x0, 0x90f8, 0x3) ioctl$VFIO_GET_API_VERSION(r4, 0x3b64) 10:40:00 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x80086603, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:01 executing program 3: openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 237.145956][T14779] IPVS: ftp: loaded support on port[0] = 21 [ 237.149891][ T312] tipc: TX() has been purged, node left! 10:40:01 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x7}) 10:40:01 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x80087601, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:01 executing program 0: pipe(&(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xffffffffffffff55}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="390000001000090468fe07002b0000000100ff0714000000450001070300001419001a00", 0x24}], 0x1) write(0xffffffffffffffff, &(0x7f00000000c0)="240000001a005f0014f9f407000904000a0000", 0x13) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$IOC_PR_RELEASE(r6, 0x401070ca, &(0x7f0000000080)={0xa5e8, 0x3f, 0x1}) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) keyctl$session_to_parent(0x12) [ 237.265754][ T312] tipc: TX() has been purged, node left! [ 237.273435][ T312] tipc: TX() has been purged, node left! 10:40:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x50, 0x0}}], 0x1, 0x10000, 0x0) 10:40:01 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x8}) 10:40:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xebffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:01 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x800c6613, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:01 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x9}) [ 237.430270][ T312] tipc: TX() has been purged, node left! [ 237.467061][T14835] IPVS: ftp: loaded support on port[0] = 21 10:40:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r4, 0x2, 0x0, 0x0, 0x0, @ib={0x1b, 0x205, 0x1, {"5dc8f69363d122be87cadea991006971"}, 0x40, 0xa96e, 0xc76c}, @ib={0x1b, 0x80, 0x7, {"4eb8ab38d2c2d540c5a36c6cfd66cbe1"}, 0x100000000, 0x2, 0xfffffffffffffff9}}}, 0x118) mount(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 237.529934][ T312] tipc: TX() has been purged, node left! [ 237.540818][ T312] tipc: TX() has been purged, node left! 10:40:01 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x801c581f, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:01 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xa}) [ 237.590110][ T312] tipc: TX() has been purged, node left! 10:40:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x5c, 0x0}}], 0x1, 0x10000, 0x0) [ 237.694325][T14829] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:40:01 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80804, 0x0) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6(0xa, 0x3, 0x7) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000100)) splice(r0, 0x0, r2, 0x0, 0x7ffffffa, 0x4) 10:40:01 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xb}) 10:40:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:01 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x8138ae83, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 237.775463][T14895] IPVS: ftp: loaded support on port[0] = 21 [ 237.789478][ T312] tipc: TX() has been purged, node left! 10:40:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x16, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:01 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xc}) 10:40:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:01 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0045878, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 237.929610][ T312] tipc: TX() has been purged, node left! 10:40:01 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x48, 0x0}}], 0x1, 0x10000, 0x0) 10:40:01 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xd}) 10:40:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_ifreq(r4, 0x8924, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0x7ff, 0x400000000000001, 0x7, 0x7, 0x1, 0x3f}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 238.082333][T14940] IPVS: ftp: loaded support on port[0] = 21 10:40:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x60, 0x0}}], 0x1, 0x10000, 0x0) 10:40:02 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0045878, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:02 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:02 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xe}) 10:40:02 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0046686, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 238.288083][T14990] IPVS: ftp: loaded support on port[0] = 21 10:40:02 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x10}) 10:40:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r3, 0x4112, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x400, 0x1, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x8}, 0x40) membarrier(0x40, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r6, 0x0, 0x0) r7 = getgid() sendmsg$unix(r0, &(0x7f0000000640)={&(0x7f0000000200)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000080)="7a931b637ffea6e1e46f509d1002b7db62591f5514e333e02a6fd70f8f27eddf6ddc9dbe4c594c7ab636ec8a91c984cd", 0x30}, {&(0x7f00000002c0)="b312b2409e2771dede9270b38806dbd83599d146f8c7055cdf607e838191d69378c25056d228653b8f309ec1201a5f040b09649a8a60e8f736ccd3230b305aee15e0014cfddd0bd5d6837bb3f40f25d93f4c2eb114d508b9360ec2b832024cf23b6ac9991ebbfc8a7b7d89e4b8ca7cccf787b895320df57daf20082fcc1e25b3cb7467e661992b73ca4dec5221daf7adf1a1642884201fb85c680725fc0366221caea5c4da0188a604470ddc33e182734fae9bfb61995259f63fe34ef95a68fa07b2880de6045b10ad232e4ee3d442f427e83f5609", 0xd5}, {&(0x7f0000000100)}, {&(0x7f00000003c0)="546241d14f2a24650e6c58d44d656e59a2e0747f7f99aa2b30b97ad401515b38b2331cba6a6ebece95dba6f5e64dd7d19d1217ff6d8181d8f9b1dd7a46c42f480704bd6fdcbb9747f76a32f725e4da273c6bd7467e0cfe18a041f0", 0x5b}, {&(0x7f0000000500)="44eb8adc9fbdf56bfe946630c07eb9ff1e5c854eca64d403e7407b5ca40ad9ac7235d612f6181f2f4519146bd362bec88f6f77a44a03b5aecc4e8a178f1cd9ab1afaa417062f2f1bcedd8337fa5ff40f240ccbfc563d8f1032a22f2ac4be1f87883854fc9d3027f76d7bfa277b8d6c4f64ea40731b23fdf4da5d39b1df2b1ed9c53f35f64295ffc8123b2773d4b133aa119f9d1b770fea39f73cc56f04f6de360942f8da", 0xa4}], 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000004bb1275a960d1734d75a20dae59cb65b", @ANYRES32=0x0, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0x78, 0x8000054}, 0x40000c4) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:40:02 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:02 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc004ae0a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 238.403628][T14993] IPVS: ftp: loaded support on port[0] = 21 10:40:05 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x48, 0x0}}], 0x1, 0x10000, 0x0) 10:40:05 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x11}) 10:40:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r2, 0xc01864ba, &(0x7f0000000040)={0x4, 0x8, 0x1, 0xcccccccc}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:05 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc008ae05, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:05 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0xffffffffffffff0f, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x68, 0x0}}], 0x1, 0x10000, 0x0) [ 241.890555][T15134] IPVS: ftp: loaded support on port[0] = 21 [ 241.901828][T15141] IPVS: ftp: loaded support on port[0] = 21 10:40:05 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x12}) 10:40:05 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0096616, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0xe38, 0x1, 0x1}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:05 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:06 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:06 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x25}) 10:40:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x68, 0x0}}], 0x1, 0x10000, 0x0) 10:40:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x6a, 0x0}}], 0x1, 0x10000, 0x0) 10:40:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x15, 0x86, &(0x7f00000002c0)="1d65d6df5d8efa6f84c227ba82e700e7eebf9b8b90c9af2090340589b48facf74a76ccf62852c2951d9499bef4c59b3f75d564f46d01923adb69665f0fc38ccae98e2e4b5e7446b2bec0d58dfb9fa06a6288212b5be6fb35b12397511cbdbe1feb9d68de58200ecec347163a3ae282bbd1b5977bfd3ea11aca7981dd0532210a0aafff950b2b"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:06 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0189436, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:06 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5c}) 10:40:06 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 242.308684][T15225] IPVS: ftp: loaded support on port[0] = 21 10:40:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$AUDIT_GET(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x3e8, 0x918, 0x70bd29, 0x25dfdbfc, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000851}, 0x20008014) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) [ 242.380782][T15232] IPVS: ftp: loaded support on port[0] = 21 10:40:06 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x300}) 10:40:06 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc018aa3f, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:06 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc01c64ad, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:06 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x6c, 0x0}}], 0x1, 0x10000, 0x0) 10:40:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x44, 0x0}}], 0x1, 0x10000, 0x0) 10:40:06 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x500}) 10:40:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e22, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x33}}, 0x693}, {0xa, 0x4e20, 0x1, @mcast1, 0xe1d5}, 0x0, [0x40, 0x2, 0x7fff, 0x5, 0x8, 0x10000, 0x369, 0x7ff]}, 0x5c) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:40:06 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0205648, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:06 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 242.767705][T15316] IPVS: ftp: loaded support on port[0] = 21 10:40:06 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x600}) 10:40:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$nfc_llcp(r3, 0x118, 0x0, &(0x7f00000002c0)=""/142, 0x8e) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x2, 0x0) pidfd_getfd(r2, r4, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000080)=r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r7}, 0xd) [ 242.886865][T15332] IPVS: ftp: loaded support on port[0] = 21 10:40:06 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020660b, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:06 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x700}) 10:40:07 executing program 0: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40086607, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:07 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 243.164423][T15398] EXT4-fs warning (device sda1): ext4_group_extend:1782: can't shrink FS - resize aborted 10:40:07 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x900}) 10:40:07 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020aa00, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2cd003, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x80000, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000100)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xc, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x40) mount(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)='bpf\x00', 0x400, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:40:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r4 = socket$isdn_base(0x22, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r8, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) sendmsg$inet(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000080)=[{&(0x7f00000002c0)="dd259e4b8e64f092a286abe5cc114b77a1ec3459dc47a5779bb37b5b199dfc0d7a1be364853f3670937c2712bbf50bb7a8d468ec522a365823f47049b5a3b045e42cd13e1fe353c9b28e7841c3db37007aacc922649cf0bcb616f725b6945ac59891c33dd7b6610d16ac6bcd2a97e50b1f51e1f0b8023f570dbc2a9baaf75358ff8284dd3b19b72c87630375149d21ddd121bb452f8c5006cc28b45c63e706b27bdefb4d7a1d93d7f97558a046f8e73125977616f3fe0f25fe191852dceeff4a0a", 0xc1}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="110000000000000000000000010000370300000000000000140000200000000000200000010000000800000000000000580000000000009000000002000000000000000094040000072bb6000000c300000009e0000002ac1414bbe0000002ac0814bbe0000001ac1414aa7f000001ac1414bb01940400000000001c000000000000000000000008000000", @ANYRES32=r8, @ANYBLOB="ac1414bbffffffff00000000cc001f00000000000000000007000000072b40e0000002ac141415ac1414bbac1414bbac141414ac14144400000081e0000002ffffffffac1414bb4410b2a000000685fffffe0000000000443ce771e000000100000001e000000100010000ac1e000100000200ac1414aaffffff010000000000008000ac1e010100000006ffffffff00000002004410d4607fffffff0000000000000003861900000001050aa26784c960e720aa070983a097a1ed6512890f43e0000001ac1e010100000200940401009404000094040100000000001c000000000000000000000008000000", @ANYRES32=r9, @ANYBLOB="00000000e000000200000000"], 0x18b}, 0x40800) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x74, 0x0}}], 0x1, 0x10000, 0x0) 10:40:07 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x70, 0x4, 0x5, "bbf4a4a15cc4a3d2ecbae3789fcd7cce", "2e339c36daeca27fa12e54bd8ebbc043f3bd7a194c3b386b5e4e97623445d2104232b2abb50131df849f7f010e3603c9afe5f141dfa083f971d8356a277f803089673cffdd7fc093cbb4eb70063175e85df08c44ca2b95cec7fc6e"}, 0x70, 0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) [ 243.616017][T15430] IPVS: ftp: loaded support on port[0] = 21 10:40:07 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc028660f, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:07 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xa00}) [ 243.739944][T15435] device bridge3 entered promiscuous mode 10:40:07 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x7a, 0x0}}], 0x1, 0x10000, 0x0) 10:40:07 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0406618, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:07 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xb00}) 10:40:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x74, 0x0}}], 0x1, 0x10000, 0x0) 10:40:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SIOCRSSL2CALL(r4, 0x89e2, &(0x7f0000000040)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:07 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xc00}) [ 243.972713][T15487] IPVS: ftp: loaded support on port[0] = 21 10:40:07 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0406619, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:08 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0506617, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:08 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xd00}) 10:40:08 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 244.140293][T15497] IPVS: ftp: loaded support on port[0] = 21 10:40:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000080)={0x0, 0x7f, 0x5, [], &(0x7f0000000040)=0x3f}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r5, 0x0, 0x0) r6 = getpgrp(r5) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=r6, 0x12) 10:40:08 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x88, 0x0}}], 0x1, 0x10000, 0x0) 10:40:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$unix(0x1, 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:08 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xe00}) 10:40:08 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc080661a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x74, 0x0}}], 0x1, 0x10000, 0x0) 10:40:08 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:08 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1100}) 10:40:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:08 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0a85352, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 244.485944][T15580] IPVS: ftp: loaded support on port[0] = 21 10:40:08 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1200}) [ 244.605974][T15595] IPVS: ftp: loaded support on port[0] = 21 10:40:08 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:08 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2500}) 10:40:08 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x8e, 0x0}}], 0x1, 0x10000, 0x0) 10:40:08 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0c0583b, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000180)={&(0x7f00000002c0)="a810e7fba85b438d5ee4a6928335a75195efd77472380a3892a4c0f25a4f09d78ca91ed69dc19d9b15170640a777aabbabd723ba0a88fd871c1bf7253881a099d6411da16008bbd6fbbdcc12a94cc8736fecbb15481496f6b8d455d5c0d57fcca1bc24bd80d086220f2296b9619760bfb7544dc68f8ab4d5abaf76c7018e5b92d210c93f088e1344dbdb136847cffe4cf8e3e911e874ee131fbcdeedda029d3a3dadd7e9551e72ca3e9ca34ce611bddd97a98cfa6d0be34990a901e07d7d1b3bfef48a79867e248546", &(0x7f0000000500)=""/4096, &(0x7f0000000100)="ac5ad6ef18947740d68ce8ab37a1c61202c53213a4695a12595785c704b5b217242c94bb07b23310", &(0x7f0000000200)="4207433bdf88f3b0dcd3c0e041a2311d2d22c2e10f3961dc701a7f75955739de68369b3c8d5784162d55cc1f40d74d6c8bfa4a1dd5f91a1bf286e729396d8cce566c326c472cef48525c6e6d3cdb609ebf36e14fc94d785da64881ca58533dad819085960706573fac40dd083aa8b04a58dd2821317d", 0x9, r2}, 0x38) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) socketpair(0x2b, 0x80000, 0x200, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000080)={'team0\x00'}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:08 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5c00}) 10:40:08 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x7a, 0x0}}], 0x1, 0x10000, 0x0) 10:40:08 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1000000}) 10:40:08 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0d05605, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$PPPIOCCONNECT(r4, 0x4004743a, &(0x7f0000000040)=0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) [ 245.031516][T15682] IPVS: ftp: loaded support on port[0] = 21 [ 245.063726][T15687] IPVS: ftp: loaded support on port[0] = 21 10:40:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000040)={0x1, 0x0, 0x2, 0x0, 0x7ff, 0x1, 0xf8, 0x9, 0x3f, 0x3f, 0x20, 0x10, 0x0, 0x40, 0x4, 0x2, 0xff, 0xff, 0x5, [], 0x1, 0xe000000000000000}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x4) 10:40:09 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xd, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:09 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2000000}) 10:40:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xa4, 0x0}}], 0x1, 0x10000, 0x0) 10:40:09 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0xffffffff000, 0xb}) 10:40:09 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x3000000}) 10:40:09 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) mmap$usbfs(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa, 0x100110, r3, 0x1) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000040), 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r5}, 0xd) 10:40:09 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x7a, 0x0}}], 0x1, 0x10000, 0x0) 10:40:09 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x4000000}) 10:40:09 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x4000000000008, 0xb}) 10:40:09 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 245.970352][T15784] IPVS: ftp: loaded support on port[0] = 21 [ 245.991767][T15790] IPVS: ftp: loaded support on port[0] = 21 [ 246.008815][T15787] IPVS: ftp: loaded support on port[0] = 21 10:40:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00'}, 0x10) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8, 0xc041) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000040)={0x0, 0x1, [0x0, 0x7, 0x8be6, 0x0, 0x3], 0x6}) 10:40:10 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x4924924}) 10:40:10 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000005e, 0xb}) 10:40:13 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xb0, 0x0}}], 0x1, 0x10000, 0x0) 10:40:13 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2}) 10:40:13 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x11, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:13 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5000000}) 10:40:13 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xb, 0x0}}], 0x1, 0x10000, 0x0) 10:40:13 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x6000000}) 10:40:13 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x3}) [ 249.314885][T15909] IPVS: ftp: loaded support on port[0] = 21 [ 249.351906][T15918] IPVS: ftp: loaded support on port[0] = 21 10:40:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r3) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000200)={r5, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000040)={r5, 0x1ff, 0x422}, 0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000140)='./file0\x00', r6}, 0x23) 10:40:13 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x12, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:13 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x7000000}) 10:40:13 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x4}) 10:40:13 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xb2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:13 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x8000000}) 10:40:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getpeername(r3, &(0x7f0000000080)=@generic, &(0x7f0000000100)=0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00'}, 0xd) 10:40:13 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xb, 0x0}}], 0x1, 0x10000, 0x0) 10:40:13 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x9000000}) 10:40:13 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5}) 10:40:13 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x25, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 249.835869][T16005] IPVS: ftp: loaded support on port[0] = 21 10:40:13 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xa000000}) 10:40:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = accept$inet6(r2, &(0x7f0000003640)={0xa, 0x0, 0x0, @local}, &(0x7f0000003680)=0x1c) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r5) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000200)={r7, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000037c0)={r7, 0xe4, &(0x7f00000036c0)=[@in6={0xa, 0x4e24, 0xded1, @local, 0x4af}, @in6={0xa, 0x4e22, 0x80, @dev={0xfe, 0x80, [], 0x2a}, 0x4}, @in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x2f}, 0x4}, @in={0x2, 0x4e21, @rand_addr=0x10001}, @in6={0xa, 0x4e24, 0x6, @loopback, 0x1ff}, @in6={0xa, 0x4e23, 0x40, @empty, 0xb31}, @in6={0xa, 0x4e21, 0x8001, @rand_addr="66829c9c6d6bdb3c5dc29591ca4f2b79"}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @multicast1}}]}, &(0x7f0000003800)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000003840)={r8, @in6={{0xa, 0x4e23, 0x2, @rand_addr="f07d454ecd5549b8be9b8fd3da106ed3", 0x2}}, 0x0, 0x3, 0xffffffff, 0x5, 0x4, 0x200, 0x4e}, &(0x7f0000003900)=0x9c) r9 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0xfffffffd, 0x405, 0x1}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r10}, 0xd) [ 249.907985][T16012] IPVS: ftp: loaded support on port[0] = 21 10:40:13 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x6}) 10:40:13 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x5c, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:14 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x7}) 10:40:14 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xca, 0x0}}], 0x1, 0x10000, 0x0) 10:40:14 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xb000000}) 10:40:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TCXONC(r2, 0x540a, 0x3) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) getpeername$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:40:14 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xb2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:14 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x8}) 10:40:14 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xc000000}) 10:40:14 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) [ 250.306362][T16093] IPVS: ftp: loaded support on port[0] = 21 [ 250.335818][T16099] IPVS: ftp: loaded support on port[0] = 21 10:40:14 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xd000000}) 10:40:14 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x9}) 10:40:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000100)='9p\x00', 0x10a429, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_uid={'access', 0x3d, r4}}], [{@smackfsdef={'smackfsdef', 0x3d, '{-lo'}}, {@smackfshat={'smackfshat', 0x3d, '{/\x9d'}}]}}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r5}, 0xd) 10:40:14 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xe000000}) 10:40:14 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xd2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:14 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1_to_bridge\x00', 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r6) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r7) r8 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r9) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYRES16, @ANYRES32=r6, @ANYRES64=0x0, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES32=r7, @ANYRES32], @ANYRES32=r8, @ANYBLOB="dc103755a8a4e785cc78ab05bfd7d52780a2816f6cd7472db4ba2b7e73ec9fcbcc02a2fa23e419a819ce99554d8f2e42de9a83cb94881617aa636ba7f478acd16a78c23db5ccc9506fb2877992d0a49164ef102d4e96e0dea57096d8413356a7e642be2bce8282693b4a70d1ef87a547681e0b00536bd7c0473c0086fa80c4879f6e311dfbc85bcdce5a4d97d16da43d5144d38aab23572b738208c71701d1d8a3a5ef27fe3947253a4417afb0cd50bcc578b5a8464fff082bd3c7aceb8e6fbb64ba6e0e0f999d0e2c27129754d707827602d550fad00d4f2ee846436f0734dc4af3", @ANYRES16=r10], 0xfe) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x4) 10:40:14 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xa}) 10:40:14 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 250.730337][T16170] IPVS: ftp: loaded support on port[0] = 21 10:40:14 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x10000000}) 10:40:14 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xb}) 10:40:14 executing program 0 (fault-call:1 fault-nth:0): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) io_submit(0x0, 0x3, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x20, r3, &(0x7f0000000380)="a7fe41555d8ff21233018af6b53d4348d988272b38ee6c13896a36df6a1d6997ced72d88236e5a69fa648a41461863a0293dc12d6106f520157148f79c594ea7f7470aee8c94b601921025e7d515a7c2563cdd95b2d0b227c332e2eac9b857075138984401f06f24793b46a25d3f7be87547cd6117ce2a4fb33770100c5df5f588d79115957b1bdc4a975943e4007b92cb324ad0f90eaec3c89e105cd501c35464c448652ba2f1", 0xa7, 0x1, 0x0, 0x0, r4}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000500)="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", 0xfc, 0x5eb, 0x0, 0x2, r2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x7, r5, &(0x7f0000000440)="a79fea54f23ef0bf09252e1da5c8b1a0e7e8ac057a18536ef0ce16e98c08f42ff3d4fb2ae94289b87c7098c0e2275a780744f9498b905b7be3392ee70c5626676d0ae32e69eaf98bbcf4d59fef6c2eaf11d09c8b6b63c4e220b5cd1890201167746e68d9471117", 0x67, 0x3, 0x0, 0x0, r6}]) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f0000000080)={0x81, 0x1, 0xfffffff9, 0x7, 0x4, "a579bfa9ae7342bcf886ed17a24dbcc68b7c14", 0x1000, 0x6}) r7 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r7, 0xc0845657, &(0x7f00000002c0)={0x0, @reserved}) r8 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r9}, 0xd) 10:40:14 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x11000000}) 10:40:14 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xfa, 0x0}}], 0x1, 0x10000, 0x0) 10:40:15 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xc}) 10:40:15 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 251.154576][T16228] IPVS: ftp: loaded support on port[0] = 21 10:40:15 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x12000000}) 10:40:15 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000040)=0x8d67) connect$bt_sco(r1, &(0x7f00000007c0), 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) waitid$P_PIDFD(0x3, r3, &(0x7f00000009c0), 0x8, &(0x7f0000000900)) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) recvmsg$can_raw(r4, &(0x7f0000000480)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/248, 0xf8}, {&(0x7f0000000080)=""/17, 0x11}, {&(0x7f00000003c0)=""/129, 0x81}, {&(0x7f0000000100)=""/30, 0x1e}, {&(0x7f0000000180)=""/9, 0x9}], 0x5, &(0x7f0000000580)=""/112, 0x70}, 0x120) fcntl$getownex(r1, 0x10, &(0x7f0000000700)={0x0, 0x0}) lremovexattr(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)=@known='trusted.overlay.opaque\x00') ptrace$cont(0x7, r5, 0x5, 0x80000001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0xd) 10:40:15 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:15 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xd}) 10:40:15 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x4, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:15 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x24499204}) 10:40:15 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xe}) 10:40:15 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x101d0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:15 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x25000000}) 10:40:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$VIDIOC_EXPBUF(r4, 0xc0405610, &(0x7f0000000200)={0x6, 0x8, 0xc88b, 0x80800, r5}) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x26b, r3}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KDFONTOP_SET(r7, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x19, 0x5, 0x1fd, &(0x7f0000000500)="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"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r6}, 0xd) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) bind$bt_rfcomm(r8, &(0x7f0000000100)={0x1f, @any, 0xff}, 0xa) 10:40:15 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xfc, 0x0}}], 0x1, 0x10000, 0x0) 10:40:15 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x40000, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:15 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x10}) 10:40:15 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5c000000}) [ 251.791534][T16300] IPVS: ftp: loaded support on port[0] = 21 10:40:15 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:15 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x1000000, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:15 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x11}) 10:40:15 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1000000000000}) 10:40:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="e1683bb9a74f43882935c3205f51c9c1"}, {0xa, 0x0, 0x0, @rand_addr="f2f909879815e4f0540ff0002573bbb9"}, r5}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e23, 0x9, @ipv4={[], [], @loopback}, 0x3f}, r5}}, 0x38) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:16 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x100000000000000}) 10:40:16 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x12}) 10:40:16 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x106, 0x0}}], 0x1, 0x10000, 0x0) 10:40:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x4000000, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) mount$9p_xen(&(0x7f0000000040)='syz\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x128010, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d78656e2c6361636865516d6d61702c706f73697861636c2c646f6e745f61707072616973652c686173682c6f626a5f757365723d656d3173656c665d922c6d61736b3d5e4d41595f57524954452c66736e616d653d776c616e316c6f76626f786e6574312770726f63656d312f62646576706f7369785f61636c5f61636365737373656c696e75786c6f2473656c696e757870726f63657468302d2f2c736d61636b6673666c6f6f723d627066002c00"]) 10:40:16 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x200000000000000}) 10:40:16 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x25}) [ 252.280073][T16359] IPVS: ftp: loaded support on port[0] = 21 10:40:16 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xd0010100, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$IPCTNL_MSG_EXP_DELETE(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x67879c1c56f59d5d}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="90000300001000000800044000000c1f080005400000000924000a8008000140000200010800014000000000100002800c0002800500010006000000100001fec000646521109d71800c000280050001001100000008000440000000040800044000000020100002800c000280050001002f0000006aabdf93acca7a7d5d2e08000940000000"], 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x20000) 10:40:16 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x300000000000000}) 10:40:16 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5c}) 10:40:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xeffdffff, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:16 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x10c, 0x0}}], 0x1, 0x10000, 0x0) 10:40:16 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x400000000000000}) 10:40:16 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x300}) 10:40:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000040)=0x3f) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:16 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x500000000000000}) [ 252.744638][T16416] IPVS: ftp: loaded support on port[0] = 21 10:40:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xf5ffffff, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:17 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:17 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x500}) 10:40:17 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x600000000000000}) 10:40:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000040)) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) fcntl$setsig(r5, 0xa, 0x2d) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xfffffdef, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:17 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x11e, 0x0}}], 0x1, 0x10000, 0x0) 10:40:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffff7f, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 253.292235][T16469] IPVS: ftp: loaded support on port[0] = 21 10:40:17 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x600}) 10:40:17 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x700000000000000}) 10:40:17 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x7f, 0x1, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x1000000, 0x0, 0x4}, 0x40) mount(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='cifs\x00', 0x10100a4, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xd) 10:40:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xfffffff5, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:17 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x700}) 10:40:17 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:17 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x800000000000000}) 10:40:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SIOCPNGETOBJECT(r3, 0x89e0, &(0x7f0000000040)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1, 0x1}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:40:17 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x900}) 10:40:17 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x132, 0x0}}], 0x1, 0x10000, 0x0) 10:40:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x4}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x101d0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:17 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x900000000000000}) [ 253.953666][T16536] IPVS: ftp: loaded support on port[0] = 21 10:40:17 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xa00}) 10:40:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:18 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xa00000000000000}) 10:40:18 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xb00}) [ 254.307510][T16538] IPVS: ftp: loaded support on port[0] = 21 10:40:18 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:18 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xb00000000000000}) 10:40:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10802, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:18 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xc00}) 10:40:18 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x134, 0x0}}], 0x1, 0x10000, 0x0) 10:40:18 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xd00}) [ 254.580630][T16615] IPVS: ftp: loaded support on port[0] = 21 10:40:18 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xc00000000000000}) 10:40:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x4000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:18 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xe00}) 10:40:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xd0010100}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:18 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xd00000000000000}) 10:40:18 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:18 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x13e, 0x0}}], 0x1, 0x10000, 0x0) 10:40:18 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1100}) 10:40:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r4, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r5}, 0xc) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001580)={r5, 0x2, 0x10}, 0xc) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) fsetxattr$security_capability(r6, &(0x7f00000015c0)='security.capability\x00', &(0x7f0000001600)=@v3={0x3000000, [{0x8, 0x648}, {0x6, 0x1}], r8}, 0x18, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:18 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xe00000000000000}) 10:40:19 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1200}) 10:40:19 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xf5ffffff}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 255.094818][T16677] IPVS: ftp: loaded support on port[0] = 21 10:40:19 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1000000000000000}) 10:40:19 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2500}) 10:40:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000080)='./file0\x00', r2}, 0xfffffffffffffff6) 10:40:19 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:19 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:19 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5c00}) 10:40:19 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x14a, 0x0}}], 0x1, 0x10000, 0x0) 10:40:19 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1100000000000000}) 10:40:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000002c0)=""/204, &(0x7f0000000040)=0xcc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:40:19 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:19 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xfffffff5}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:19 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1000000}) [ 255.841806][T16742] IPVS: ftp: loaded support on port[0] = 21 10:40:19 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1200000000000000}) 10:40:19 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:19 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2000000}) 10:40:20 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2449920400000000}) 10:40:20 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x162, 0x0}}], 0x1, 0x10000, 0x0) 10:40:20 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:20 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x3000000}) 10:40:20 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2500000000000000}) 10:40:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) r4 = shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(r4, 0x0) r5 = shmat(r4, &(0x7f0000ffa000/0x4000)=nil, 0x1000) shmdt(r5) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000200)={&(0x7f0000000040)=[0xfffffff7, 0x4, 0x0, 0x1], 0x4, 0x6, 0x7, 0x2, 0x2, 0x74, 0xe0, {0x80000, 0x4, 0x8, 0x81, 0x2a, 0xdd8, 0x21d, 0x366, 0x2314, 0x1f, 0x1, 0xfc00, 0x4b4, 0x20, "79a0b1ce095f744b3c0431db989197fb2d2b0da190834078082279eef44bf42d"}}) 10:40:20 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x400000000000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:20 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x4000000}) 10:40:20 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5c00000000000000}) [ 256.474270][T16807] IPVS: ftp: loaded support on port[0] = 21 10:40:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='ocfs2\x00', 0x1040000, &(0x7f0000000180)='bpf\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:20 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x8000000000000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:20 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x4924924}) 10:40:21 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x1100, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:21 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xffffffff00000000}) 10:40:21 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xd001010000000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:21 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x164, 0x0}}], 0x1, 0x10000, 0x0) 10:40:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = accept4$rose(r3, &(0x7f0000000040)=@short={0xb, @dev, @rose}, &(0x7f0000000080)=0x1c, 0x80000) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e20, @multicast2}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f00000002c0)={0x2, 0xffffff01}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockname(r6, &(0x7f0000000200)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000180)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r5}, 0xd) 10:40:21 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5000000}) 10:40:21 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 257.176587][T16868] IPVS: ftp: loaded support on port[0] = 21 10:40:21 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x6000000}) 10:40:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setitimer(0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x2710}}, &(0x7f0000000080)) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:21 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xf5ffffff00000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:21 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x7000000}) 10:40:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:21 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:21 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x182, 0x0}}], 0x1, 0x10000, 0x0) 10:40:21 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:21 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x8000000}) 10:40:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000100)='./file0/file0\x00', 0xac) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r5, 0xc1205531, &(0x7f00000002c0)={0x3, 0x4, 0x200, 0x7f, [], [], [], 0x9, 0x8001, 0x1, 0x7ff, "6101bb5f680abe232006dc09a183829b"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) [ 257.899666][T16933] IPVS: ftp: loaded support on port[0] = 21 10:40:21 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0xffffffff00000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:21 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x9000000}) 10:40:21 executing program 3: ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r0 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x6) close(r0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000200)={r2, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={r2, 0x5, 0x0, 0x9, 0x80000001, 0x2}, &(0x7f0000000080)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x11, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x40) sendto$unix(r0, &(0x7f0000000340)="a0b5d424d06e72d58f899241f9969d583089830bb4274439a5b512da05b0d05c518a9d6f42e5c5b1537a35279f7b6c10bd94721d09d2f2d7d8d9aec7d4e7edda8a36d1526f0411f1a4f99db22f52b302dffbf94f960a508aba08457b427291e795add0879c8d0d4e72ad04d3c06d7a6e638f5505aedcf8f3314958d31b7f03dd0ba7e5bb44c68048a064d2708ac4c54a5e14b365176d8258ee74a48f0f643fc561b5f0db4fb9eec23f767cebccaed2423395d961c04bf3a39f095a19c364f279de5c450dc078a83b14f793a0f2b912cac666421ceb703aaea0bc80d75e66376ace1dc0cace5c77d78d447eca5f3e6cd16228f0793a93b240", 0xf8, 0xc000, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r6}, 0xd) 10:40:22 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xa000000}) 10:40:22 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x19c, 0x0}}], 0x1, 0x10000, 0x0) 10:40:22 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x101d0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 258.398284][T16978] IPVS: ftp: loaded support on port[0] = 21 10:40:22 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:22 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xb000000}) 10:40:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r3) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r5) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r6, 0x1) r7 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x4, 0x7e, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x4, [], 0x0, 0xffffffffffffffff, 0xffffffff, 0x0, 0x1}, 0x40) mount(0x0, &(0x7f0000000200)='./file0/file1\x00', &(0x7f00000001c0)='bpf\x00', 0x86882, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r8}, 0xd) r9 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r9, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$kcm_KCM_RECV_DISABLE(r9, 0x119, 0x1, &(0x7f0000000180), 0x4) 10:40:22 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1b2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:22 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 258.775051][T17017] IPVS: ftp: loaded support on port[0] = 21 10:40:22 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xc000000}) 10:40:22 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:22 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xd000000}) 10:40:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1ce, 0x0}}], 0x1, 0x10000, 0x0) 10:40:23 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd0010100}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:23 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xe000000}) [ 259.236505][T17063] IPVS: ftp: loaded support on port[0] = 21 10:40:23 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:23 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:23 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x10000000}) 10:40:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1f2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:23 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:23 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x11000000}) [ 259.854611][T17104] IPVS: ftp: loaded support on port[0] = 21 10:40:24 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:24 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x12000000}) 10:40:24 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1fa, 0x0}}], 0x1, 0x10000, 0x0) 10:40:24 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:24 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x24499204}) [ 260.271160][T17144] IPVS: ftp: loaded support on port[0] = 21 10:40:24 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x25000000}) 10:40:24 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x2500, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:24 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:24 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5c000000}) 10:40:24 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x20a, 0x0}}], 0x1, 0x10000, 0x0) [ 260.861536][T17187] IPVS: ftp: loaded support on port[0] = 21 10:40:24 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:24 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1000000000000}) 10:40:25 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:25 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x100000000000000}) 10:40:25 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x230, 0x0}}], 0x1, 0x10000, 0x0) 10:40:25 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:25 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x200000000000000}) [ 261.322528][T17231] IPVS: ftp: loaded support on port[0] = 21 10:40:25 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 261.673943][T17232] IPVS: ftp: loaded support on port[0] = 21 10:40:25 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:25 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x300000000000000}) 10:40:25 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd001010000000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:25 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:25 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x400000000000000}) 10:40:26 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:26 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x500000000000000}) 10:40:26 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:29 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x236, 0x0}}], 0x1, 0x10000, 0x0) 10:40:29 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x600000000000000}) 10:40:29 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:29 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) socket(0xa, 0x5, 0x6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f00000000c0)={r3, 0x1}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f00000003c0)={r3, 0x2}) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = open(&(0x7f0000000100)='./file0\x00', 0xc8000, 0x8) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r6, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x105}, 0x20000010) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xfffffffffffffffc}) setsockopt$nfc_llcp_NFC_LLCP_RW(r4, 0x118, 0x0, &(0x7f0000000000)=0x200, 0x4) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)={0xa0, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfcce}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1c5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4}, 0x4800) 10:40:29 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 265.477296][T17347] IPVS: ftp: loaded support on port[0] = 21 10:40:29 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:29 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x700000000000000}) 10:40:29 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:29 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x800000000000000}) 10:40:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) sync() bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000080)={&(0x7f0000000040)="606171f6063f7f2fe52e9aac630319510ee61349daa9d24ed6d2f2", 0x1b, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r2, 0xc01064ac, &(0x7f0000000100)={r4, 0xb6, &(0x7f00000002c0)=""/182}) 10:40:29 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0x1, 0xfffffffffffffffc}) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080)=0x3f, 0x4) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000004c0)={&(0x7f0000000180)="5f32998a69d500e446ba6220289642a30d9fe6e72a05ac3dc869787189b5de46a2a42231b1b0a594c7f42f4c806c04e7db53cbdd96501c5e1513bad6b54b35ca13f5fdf1460c8a22beed5f95c9437bae932352ac3c9c05fc34d3d9b4f953d9aeab616a1a894c18bf4368155c6cf7f4d2a0d82e9a18c5e57ea5f4cbff41e123e63cbc6d4690d3cf2a268297c04c61963ab5c8564ca1abd79baa7a0be48e9c7ea7b7fb87738081e56354b110849397f4db16d71cd0e500fc5332e087c922c87e99dd6ec3a598a70f7a5fea481d1cb402ff9d835f", &(0x7f0000000280)=""/237, &(0x7f0000000380)="1f534df64ca5af02870d450156bb3d34c16df718eb63cd85ef200c76924302d97b13986e4bcaf2cc716e5cbdfc408f6241bb05dc16981558d0023675d9774b0398b487ead6180455de42f67d1ee0db72b277fe9d32133c880a10d125ffb2caaa3b43733b0382d04585f49949e0976c3513f0184a73708dc8dfa6e6039e3a813924186e24cdbf462054476feef5d7cc12b3c1650894f2e038540ebe9d6821880bdf8c73eec1ad3d105908c48b808d127acb1b27fff5b6f37212963ef6a9d234537731760094c65708d778452fab33b1df0b04586b9404be196afc6c6a06d2ffe967b517a4f5a2fe0a27cd785fb8", &(0x7f0000000480)="af86f1c99cfd4b441f5e2e84ae037f02c24712f3292558a6702fa073ea66c5fda8e935566794b52b34655c6dc06b7966c1752a", 0xea, r0}, 0x38) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getpeername$ax25(r2, &(0x7f0000000100)={{0x3, @netrom}, [@null, @null, @remote, @rose, @null, @bcast, @bcast, @netrom]}, &(0x7f0000000000)=0x48) 10:40:29 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x900000000000000}) 10:40:29 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2a4, 0x0}}], 0x1, 0x10000, 0x0) 10:40:29 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101d0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:29 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 265.987628][T17403] IPVS: ftp: loaded support on port[0] = 21 10:40:30 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xa00000000000000}) 10:40:30 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x5c00, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:30 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x200007e, 0x6, 0x6, 0x1, 0x1, 0x0, [], r6, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r8}, 0xd) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) 10:40:30 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xb00000000000000}) 10:40:30 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x38080, 0xd) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000000)={0xc025, 0x3}) 10:40:30 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2b4, 0x0}}], 0x1, 0x10000, 0x0) 10:40:30 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xc00000000000000}) 10:40:30 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @sack_perm, @window={0x3, 0x1000, 0xe32}, @timestamp, @window={0x3, 0x0, 0x3f}], 0x6) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:30 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 266.527795][T17453] device bridge3 entered promiscuous mode [ 266.539725][T17455] IPVS: ftp: loaded support on port[0] = 21 [ 266.609252][T17458] IPVS: ftp: loaded support on port[0] = 21 10:40:30 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xd00000000000000}) 10:40:30 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:30 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xe00000000000000}) 10:40:31 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) r5 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff}) msgctl$MSG_INFO(r5, 0xc, &(0x7f0000000040)=""/84) 10:40:31 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000380)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0xfffffffc}}}}, 0x30}}, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x4000, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="8441c9ad25076df9cf", @ANYRES16=r2, @ANYBLOB="000229bd7000fedbdf2501000000000000000b000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0xc000}, 0x4004085) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x20, 0x70bd26, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0x50000}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x50045}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') unshare(0x40600) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000002c, 0xffffffff, 0x9}) 10:40:31 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1000000000000000}) 10:40:31 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0010100}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 267.501177][T17536] Unknown ioctl 35297 [ 267.549303][T17544] Unknown ioctl 35297 10:40:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2b6, 0x0}}], 0x1, 0x10000, 0x0) 10:40:33 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:33 executing program 4: unshare(0x40600) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:33 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1100000000000000}) 10:40:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x5413, 0x2, 0x8, 0x7fffffff}, {0x3, 0x1, 0x8, 0x8}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:33 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x400000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:33 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xe70b}) 10:40:33 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1200000000000000}) 10:40:33 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:33 executing program 4: unshare(0xdd51cd5ba4346ef9) r0 = open(&(0x7f0000000000)='.\x00', 0x80080, 0x9a) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0xf000000, 0x7fff, 0xdde8, r0, 0x0, &(0x7f00000000c0)={0x9a091e, 0x8, [], @p_u8=&(0x7f0000000080)=0x9}}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000140)={0x0}) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000001c0)="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") ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000180)={r3, 0x1}) [ 269.605783][T17575] IPVS: ftp: loaded support on port[0] = 21 10:40:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x48, 0x4000006, 0x1, 0xe, 0x1, 0x10, [], 0x0, r3, 0xffffffda}, 0x40) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x400043, 0x0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$cgroup_int(r7, &(0x7f0000000100)=0x25, 0xffffffffffffff7e) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:40:33 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2449920400000000}) 10:40:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2be, 0x0}}], 0x1, 0x10000, 0x0) 10:40:33 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:33 executing program 4: unshare(0x40600) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 10:40:33 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2500000000000000}) 10:40:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x185100, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x4, 0x6, 0x1, 0x1, r3, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffd, 0x0, 0x1}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) [ 270.021689][T17630] IPVS: ftp: loaded support on port[0] = 21 10:40:34 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:34 executing program 4: getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="cd59a824501c6ec8ac26581b9c6c3cb6df36749396df22b795847fcf626b294b"}}) unshare(0x40600) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x2220c0, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x10c, 0x2, 0x8, 0x0, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT_DATA={0x54, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0xf22}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x5a}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0xb8}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0xb5}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x200}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1f78}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8b}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x200}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xffffff80}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_FIN_WAIT={0x8, 0x4, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_TCP_SYN_RECV={0x8, 0x2, 0x1, 0x0, 0x6000}, @CTA_TIMEOUT_TCP_FIN_WAIT={0x8, 0x4, 0x1, 0x0, 0x80}, @CTA_TIMEOUT_TCP_TIME_WAIT={0x8, 0x7, 0x1, 0x0, 0x101}, @CTA_TIMEOUT_TCP_ESTABLISHED={0x8, 0x3, 0x1, 0x0, 0xa5}, @CTA_TIMEOUT_TCP_CLOSE={0x8, 0x8, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_TCP_TIME_WAIT={0x8, 0x7, 0x1, 0x0, 0x101}, @CTA_TIMEOUT_TCP_RETRANS={0x8, 0xa, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_TCP_CLOSE={0x8, 0x8, 0x1, 0x0, 0x5}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4004) ioctl$USBDEVFS_RELEASE_PORT(r2, 0x80045519, &(0x7f0000000180)=0x4) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r4, 0x6430) 10:40:34 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:34 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x5c00000000000000}) 10:40:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000040)={0xfff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_FPEMU(0xa, 0x3) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:34 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2c2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:34 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:34 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xffffffff00000000}) 10:40:34 executing program 4: unshare(0x40600) r0 = open(&(0x7f0000000080)='./file0\x00', 0xca241, 0x1) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) signalfd4(r3, &(0x7f0000000080)={[0x4]}, 0x8, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000180)={0x6, 0x401, [{0x64e, 0x0, 0x3}, {0x8000, 0x0, 0x7fff}, {0x1cac0878}, {0xcded, 0x0, 0x8}, {0x2, 0x0, 0x800}, {0x9, 0x0, 0x6}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='pstore\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) [ 270.470387][T17674] IPVS: ftp: loaded support on port[0] = 21 10:40:34 executing program 4: unshare(0x8040400) r0 = open(&(0x7f0000000000)='./file0\x00', 0x280040, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:34 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:35 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:35 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2cc, 0x0}}], 0x1, 0x10000, 0x0) 10:40:35 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0x4}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:35 executing program 4: unshare(0x40600) eventfd2(0x53fb9b8b, 0x80802) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) inotify_init1(0x80000) ftruncate(r1, 0x9) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r3) r4 = socket$inet(0x2, 0x80001, 0x84) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$smackfs_ptrace(r5, &(0x7f0000000080)=0x2, 0x14) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000200)={r6, @in6={{0xa, 0x0, 0x0, @remote}}, [0x0, 0x0, 0x1f]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000000)=r6, 0x4) 10:40:35 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0x101d0}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 271.597558][T17748] IPVS: ftp: loaded support on port[0] = 21 10:40:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r7) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r8) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="34000b0010000104536d00"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES64=0x0], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRES32=r6, @ANYRESDEC=r0, @ANYRESDEC=r8, @ANYRES64, @ANYRESDEC=r5], @ANYRESDEC]], @ANYBLOB="9dd0ab6e38f6d336546db0da494e134ece7af772e2cf2c1d7c9e5130051e3ed0bda25cf6ee9dc3c29f921bf34ea4dd2bbe7cfc26aa2b350c0c19967f57faaf465685f7b208121de1bf80be94308f7972f8b591f7df5f85e8af60c4d96bc3541dbaf019a7433601c755cc42d34713f70bf4144d09d187e252d301aab4b11a88c238a7d26db6aa744f851f383719498adb4951db2133156a1d1a40439b7493b62051f51be2a39ca2daba397ab740cf0ac0b0"]], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'veth1_to_bond\x00', r5}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000003880)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000003840)={&(0x7f00000037c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="300929bd7000fedbdf2507000000"], 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x20000014) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000140)) unshare(0x40600) r9 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r9, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:35 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0x40000}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:35 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2cd, 0x0}}], 0x1, 0x10000, 0x0) 10:40:35 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0x1000000}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:35 executing program 4: unshare(0x40600) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x1c1) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 271.982198][T17787] IPVS: ftp: loaded support on port[0] = 21 10:40:36 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0x4000000}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:36 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x20, 0x81, 0x1, 0xbb, 0x0, 0x5b, 0x3, 0x3, 0x8, 0x4b, 0x1, 0x80, 0x1, 0x1f, 0x40}}) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:36 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:36 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0xd0010100}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:36 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000000)={0xa, {0x3, 0x20, 0x3}}, 0xa) 10:40:36 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2e2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:36 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0xeffdffff}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 272.576465][T17832] IPVS: ftp: loaded support on port[0] = 21 10:40:36 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0xf5ffffff}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:36 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:36 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x50}, 0xf800c4c9d19eed31) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsu\x00', 0x8002, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000002c0)={&(0x7f0000000100)="778f846227b26ce16c046fe909f4ec85043d5266689282401a38c4290b51028215adc1fc2afe823c0417f4bb18181a629b19e5c15f51de8a3f13bd4bbd2616458ca6da77e89e745b2d0432a73247f8714590058f57163a0a46d5ed51c41b9d149a6e09cbd54b96f7e2c583a1bf78", &(0x7f0000000080)=""/20, &(0x7f0000000180)="804c3c36b2cb8e717a3d3c84a2ba0ef25405", &(0x7f00000001c0)="c4cd5f7fe239d4ce911ee28b3b8df9aa3385de172f9ee8517f86b3c5f6e378b0461a766dc9d176fc7224ab7f0e936b785b8caf70eda87adec420ac908257aa31175c173b1298d0cbb2fab67eef7a2832356a93b403350c156453ac6d1e38b200458889d05e91cf163bcafda6f6a2a1190d459c76ab12a1ec2e79b104b303de9eb07f71e979e9567bec41d6c1e687ac9e25e3", 0x8, r1, 0x4}, 0x38) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000400)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x4, 0x9, 0x6, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000000)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:36 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2f4, 0x0}}], 0x1, 0x10000, 0x0) 10:40:36 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0xffffff7f}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:36 executing program 4: unshare(0x40060600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 273.007956][T17874] IPVS: ftp: loaded support on port[0] = 21 10:40:37 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}, 0xfffffff5}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 273.094734][T17880] IPVS: ftp: loaded support on port[0] = 21 [ 273.257146][T17880] IPVS: ftp: loaded support on port[0] = 21 10:40:37 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:37 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x2}, 0x80, 0x0}}], 0x2, 0x0) 10:40:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2fa, 0x0}}], 0x1, 0x10000, 0x0) 10:40:37 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x4}) [ 273.530021][T17955] IPVS: ftp: loaded support on port[0] = 21 10:40:37 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0xa}, 0x80, 0x0}}], 0x2, 0x0) 10:40:37 executing program 4: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x5, 0x800000b, 0xffffffbffffffff9}) 10:40:37 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x0}, 0x80, 0x0}}], 0x2, 0x0) 10:40:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x300, 0x0}}], 0x1, 0x10000, 0x0) 10:40:37 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x2}, 0x80, 0x0}}], 0x2, 0x0) [ 273.881401][T17995] IPVS: ftp: loaded support on port[0] = 21 10:40:37 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x3}, 0x80, 0x0}}], 0x2, 0x0) 10:40:38 executing program 4: unshare(0x40600) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x2ec, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xa0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x1, 0x8, @remote, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xe05, @mcast1}}}}]}, @TIPC_NLA_NODE={0x34, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0xac, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x972}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1b9f98e2}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6ab}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x69}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x11c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffff80}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xee}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xec}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xc3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xc2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x81}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffe01}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x74}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x20000000}, @TIPC_NLA_PUBL_TYPE={0x8}]}]}, 0x2ec}, 0x1, 0x0, 0x0, 0x24040854}, 0x10) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f00000004c0)="0623bfc1e55449b53a43599fdcb9c2ef2c41ede59eb967174c7b62f73c1e06814824fdfa1df701b6f552f19d325cbfa5fc33ac886cb10e97029b7cf5825156fd8f654a9f6221fc730a8bfeb23736b33b2ace9209fd1384580b8b6fd852492c822235905ab569692c24d39c77112b82e2a5c8563cb3e82f90ba741dbc02576ab552587ddcf37541a90242821bbc40be21143f72c9d11789c7a2f955f98b142962be52a443bebf33035f582f339c2923fb8fa2ad60ca6065c1388d0e99d2fd9a43a9803438de672ff85ee5fde009939536", 0xd0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r3, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000440)={r3, 0x542b, 0x400, 0x3, 0xff, 0x80000001}, &(0x7f0000000480)=0x14) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:38 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:38 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:38 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0x3, 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000000)={0x9, 0x80000000, 0x7b4, 0x6d0}) unshare(0x40600) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r4], 0x2) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:38 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x303, 0x0}}], 0x1, 0x10000, 0x0) 10:40:38 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x4}, 0x80, 0x0}}], 0x2, 0x0) 10:40:38 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 274.539430][T18044] IPVS: ftp: loaded support on port[0] = 21 10:40:38 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x4}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:38 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x306, 0x0}}], 0x1, 0x10000, 0x0) 10:40:38 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x101d0}}, 0x80, 0x0}}], 0x2, 0x0) [ 274.868093][T18078] IPVS: ftp: loaded support on port[0] = 21 10:40:38 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x40000}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x314, 0x0}}], 0x1, 0x10000, 0x0) 10:40:39 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2, @in=@broadcast, 0x4e23, 0x36c, 0x4e20, 0x101, 0xa, 0x1a0, 0x80, 0x3b, r6, r8}, {0x1f, 0xfffffffffffffff9, 0x2, 0x8, 0x8, 0x5, 0x0, 0x7f}, {0xffff, 0x5, 0x800, 0x100}, 0xeea3, 0x6e6bba, 0x0, 0x0, 0xb4650e4f858155a2, 0x3}, {{@in6=@remote, 0x8, 0x6c}, 0xa, @in6=@mcast1, 0x3504, 0x1, 0x2, 0xd4, 0x3, 0x9, 0x7}}, 0xe8) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000543166f981342961a585b78459f5fafa3c0501562000000000c20000020000580140087311f0280"], 0x34}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xb0, r2, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x72}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80}]}, @TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:39 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1000000}}, 0x80, 0x0}}], 0x2, 0x0) [ 275.189947][T18112] IPVS: ftp: loaded support on port[0] = 21 [ 275.206439][T18115] device bridge1 entered promiscuous mode 10:40:39 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:39 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x4000000}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:39 executing program 4: unshare(0x40600) r0 = open(&(0x7f0000000100)='./file0\x00', 0x28000, 0xecfd8333b8c51064) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x0, 0x7530}}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x32a, 0x0}}], 0x1, 0x10000, 0x0) 10:40:39 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0xd0010100}}, 0x80, 0x0}}], 0x2, 0x0) [ 275.521718][T18156] IPVS: ftp: loaded support on port[0] = 21 10:40:39 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_PCM_IOCTL_INFO(r1, 0x81204101, &(0x7f0000000100)) 10:40:39 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0xeffdffff}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:39 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$RTC_VL_CLR(r0, 0x7014) unshare(0x40600) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:39 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0xf5ffffff}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:39 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000000)={0x8000, 0x8, 0x401, 0x8f, 0x1f, 0x1000}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:39 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0xfffffdef}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:40 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0xffffff7f}}, 0x80, 0x0}}], 0x2, 0x0) [ 276.345223][T18204] IPVS: ftp: loaded support on port[0] = 21 10:40:40 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:40 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = dup(r0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0xffffffff, 0x4) unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) 10:40:40 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0xfffffff5}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:43 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x336, 0x0}}], 0x1, 0x10000, 0x0) 10:40:43 executing program 3: sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x80, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x40020}, 0x40091) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000180)='bpf\x00', &(0x7f0000000200)='security.capability\x00', 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsu\x00', 0x40, 0x0) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000400)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x24, r4, 0x711, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4800041}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100429bd7000fedbdf25030000000500386fb300000008002c0000170000050029000100000005003700000000c9930455ea05c0f6f7ae1e903d0008003c000000008068d3c842280500300000000000"], 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x800) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0xd25, 0x1}]}, 0xc, 0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r9}, 0xd) 10:40:43 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:40:43 executing program 4: ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000080)={0x1f, "16abbb0330a9b26331bd034bb79341ecf5153021084281ee76df679140bbbcee", 0x0, 0x1}) unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x24401, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000100)=0xfc93, &(0x7f0000000140)=0x4) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x0, 0xb, 0xfff}) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000000)=0x6) 10:40:43 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000200)={r4, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={r4, 0x3f}, &(0x7f00000001c0)=0x8) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'bond0\x00'}) r6 = accept(0xffffffffffffffff, &(0x7f0000001700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000001780)=0x80) r7 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000001800)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r6, &(0x7f00000018c0)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x2000}, 0xff9f, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="ecc5a3e0", @ANYRES16=r7, @ANYBLOB="00042bbd7000ffdbdf2503000000080001000000000008000200020000000800010000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002500)={&(0x7f0000000400)=ANY=[@ANYBLOB="0000000088eeaec0401b343e5fb61e3a9a2c96016c60867b53aa5e06f79296ae1e8245695903c5825d2d79eb97be2c486a60cfee761c1b7e4d1c270f32347921ae901ba811b7643d0d30cb5d34ef7502fc96213ad694d3051702152b9edf45f301b6804295aef6c1a8e42965ac4e1d8898a85460e97e9a0b121425411a5416d23f6c9b05584268d539ab06e72750c011c092bd3c", @ANYRES16=r7, @ANYBLOB="000829bd7000fddbdf2502000000080002000200000008000100000000000800020002000000"], 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x8000) sendmsg$NLBL_CALIPSO_C_LIST(r5, &(0x7f0000000780)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xbb4289e2ace48c41}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, r7, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000050) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, r7, 0x1, 0x70bd26, 0x3, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x880}, 0x4040000) 10:40:43 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:43 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x4}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:43 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x101) close(r0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0xfff, 0x8, 0x1}) 10:40:43 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) [ 279.478972][T18255] IPVS: ftp: loaded support on port[0] = 21 10:40:43 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x101d0}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r6) r7 = syz_open_dev$tty1(0xc, 0x4, 0x4) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r9 = openat$smackfs_logging(0xffffffffffffff9c, &(0x7f0000001d00)='/sys/fs/smackfs/logging\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003100)=[{&(0x7f0000000200)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)="9a86f183f4105cfe5d618a4390d3fbaf952a0d8d66c480a93c18eb5f52fefba4e44817d6f83b37d31c47f6", 0x2b}, {&(0x7f00000002c0)="113054c59e6771805e8e884ff3fb66cc75c2e74e7c8b8efd963d8d6dc694fb3a94821ee7617b06f52ed1aff3c73430c99808051029dfc190b81cef13d6cb810a177ec8ebed70f2f17d55e08e8fcdbee0fcd69236e50c3cc64e8b69999446c7c77f44e103e30ef58fcb664a9a628bf2e7fed703e422311cfe6eca1d868e8818df9d725e99f8a95ee849a68c16f4bac271a50704ace629bd6484f3414e7c1aa239458452ec84c74448f8ca0e60fb788e7d3784a39b4983123cc7a5c1737cb6d8fd0395e366fa54b65d33385048fd3744ee52fcd9aba9654904c014", 0xda}, {&(0x7f00000003c0)="eaf1b3ebaba20f6a0a99c4b9691e6b79ab4727dedd24629373a7b2c6480ddb1918c94334cd356cabc089a72389f8001f83d66cd85c6df9cfbedb2a0dbe1db6055f3e4cf0abdc4b40badea385df984d7ecde514ac535f006a94af9a7f9daccfd8ebb96e6e99a1681f8ec01d8e5d8e06f28f46f803debbd9e9d3c8fee203a00dada5987859caebcf70dc7ce0060afdebbf95f15878d027998ef5caeaa2b28b8d404d6c43e26bd8ca4e01bd3abefe0275e3fadc2b9e5e821d4391a6958ba9153e368a025c9e94d56399158fec", 0xcb}, {&(0x7f0000000500)="c64d7689a667a9b5361c7d77d463c8d4ead4995d20e50b4de5c3007faa3b994e03f1b70cc69c3c96baeb811860927fff7dfcc6cb49443c019aa1a0146894fd42a7881128c56e444c1aeaa44b", 0x4c}], 0x4, 0x0, 0x0, 0x14}, {&(0x7f0000000580)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000600)="e9eac979f0c11b7444af21e181b71f5943a411a8f8be3a95dbc1778b32cdce34cb3aa2e34123910fa1e0c3427d6c8dd0593044bbb5972e2be9b41252e1b83e17c9f7f1aaa585db1369582957a35a415a53278d6a52940814710e", 0x5a}, {&(0x7f0000000180)="675bffd9131e9478c480bad085db97b7881595eaf9bb51a553", 0x19}, {&(0x7f0000000680)="054ce77b02a90f917557ae11d9416405f3a967496f8d36", 0x17}], 0x3, &(0x7f0000000840)=[@cred={{0x1c}}], 0x20, 0x44044}, {&(0x7f0000000880)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000000900)="bd89d42b1bf9576c848ae446afd4316352def6bb4ef397138034", 0x1a}, {&(0x7f0000000940)="a7a9e92ce99f122ada454d92a9b0154b3d9b221a8aec0d3cc60c6f21d9a7458128c41882a45717639949b21835535c9682040130fb441e88d3477124aa84ec6af542675cc334ddb83344a66072dbc738e6a2ac8f1343ecc61fcf2f0d45b7bb54d5944ec88afa01331590a7d0222bf94547a2fec2ce849e0ef49adefc720213d4ee737846d9db8c0765", 0x89}, {&(0x7f0000000a00)="4b4f4dfab9a63f3a0e44b61034932fefcadff48b1a00975934367f273f52ae7b9bd3f1deb5e0718219e57a3cfda2f546943688a3fee24e777796a1d9850a81bfbf5a7d1f227bb9a3f07f38718bb15385dab630e6c7d18a", 0x57}, {&(0x7f0000000a80)="c0d169d9b69816450c9eed057ec0c09cbb9500094110c709153f3c3a2a37c2a8008e1af778d92515f41cc2f07efb7421e3e823317a3398457c9caae5fc91802f3e085ee36a16211ca3aa4c4f2854dd9d59d3dfdfcadafc5fe3d85c829603082be359818ad2d96e097b55b8ac3aa49ca3222ffcf9482a849394e6a612ade3deb66f4381480099636046581a92cf03e0ccf331a1471325a34c5b274c9e79e1a14dc484ac685c70f9c26883f95d5c4056cf1e6a9bae2ba2", 0xb6}, {&(0x7f0000000b40)="bc807d7dc15112bcdf8b727d698950a0ff3956135503f746cfa224ef2f2db22d60f71cc7de9825a76922a8a36a5e9f351f6ae64ed4ea85bb69325adbb9a0b5d78209c447f59a5c680cfa6bbc27995075ab62f6a6f83438002a328586a487128661d7ba0a7153adb87ae9221d4f073f2273e7fcde0584c2090256e5c5ed2c2a14d99f073cbe5ba9dcb8856ecbd2310370930fed73fa8632712e5854a350c7751e06f4660cb22808b8522a4c6455bf420eb80abfd474f9c37ad7f1950a0633d69323fea2d82443afcdfd754a8bf1da99dfd1", 0xd1}, {&(0x7f0000000c40)="37cfecf23550f169da41a8e26f1d3315735bf8308c7b545f4878ffe2dd2b4ece7526bfd697cb1e8c06f5e52d", 0x2c}, {&(0x7f0000000c80)="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", 0x1000}], 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="1c0000000000000001000000020000c011f529b74ee25658d409b3326c744e704708eb4b90c9965cb98b7a93b74999c43018ce32a729cefb8c9eddc721a265e9e98814624766b6bebb3593541da0e1f396faf835b8a7f40dc1d7c162741a383d283744a18e68716b1d69454d5340603e298d7ef702e8a2", @ANYRES32=0x0, @ANYRES32=r4, @ANYRES32=r6, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r9, @ANYBLOB='\x00\x00\x00\x00'], 0x48, 0x4}, {&(0x7f0000001dc0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000003080)=[{&(0x7f0000001e40)="747f41b92d87ca15222d4b43910d60944e51e29c655cb788b11eca70a8f50f0184f7636511e909b6c6863305bbc612a968bae44d27e9c9d480dc7ed40a96283a0692460bb0d4eed5951b8e2e72bcc6d51abe019170ccf5a363202c95dbbc0b378cb35b71bae39572176720a2a43eafac", 0x70}, {&(0x7f0000001ec0)="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", 0x1000}, {&(0x7f0000002ec0)="fd94d4a6413123657760088065ff89276776c3cff0fb32f6b32659d470565c08c6a14ca438947724f57eecf804c889ca12254630991a8f26e4b6e2d49c35d9b28050ae0b922fa032a4c1142c82aef2f29968f5a05fcbc26b0ab61794fcd6722cd4", 0x61}, {&(0x7f0000002f40)="7b0247fb8a99b84a8d61c330f6f4758dbe8453372d3822d9895e27bea3062ecc5683ab462cc26e6e950823349ef4a6a5d9266d76657fd7d7bd028dfcc69229b2", 0x40}, {&(0x7f0000002f80)="6fda8855268bbc2af596d3e537a5db509d5c597830a1df803dc96dec8291fc2e24c73ed7e81c94db4cb69a76eb6a27bc9908177dcefe429eee7c84473d3dcc66b7158c57f058b2ae8e0107a7f958fd5e6b86cb42e2da943524597fa4ca641748ca63bb15db78431fde48ee4f232cea83f45a38568cb9d834a5394a272749e659dec7011b4a54cd26424ae983102181c836af71f021e1c0eb297c8802d4d0600b2677f0ad40c18e28d215eea4662307a0f5ba42b5c16e7732312e2821643ba819d031326865bcdda56e97da111490aba53e69468241a77f6fa65e25a52b4e016e3d8f310644aebf98c204b382b91aad07bc8b986da897cb8fb6", 0xf9}], 0x5, 0x0, 0x0, 0x4000800}], 0x4, 0x4c090) mkdir(&(0x7f0000000700)='./file0\x00', 0x2b40a1e80e769d15) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r10}, 0xd) 10:40:43 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x350, 0x0}}], 0x1, 0x10000, 0x0) 10:40:43 executing program 1: unshare(0x40600) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0xe5) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:43 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x40000}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:43 executing program 1: unshare(0x40600) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f0000000000)=0x8000) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:43 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0xd5c0a9a34840630b) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000100)={{0x5c, @dev={0xac, 0x14, 0x14, 0xb}, 0x4e23, 0x0, 'lblcr\x00', 0x8, 0xffffff00, 0x80}, {@multicast2, 0x4e20, 0x1, 0x8, 0x4eb, 0x8}}, 0x44) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 279.898419][T18297] IPVS: ftp: loaded support on port[0] = 21 10:40:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file1\x00', 0x19a) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40480, 0x0) setsockopt$packet_int(r4, 0x107, 0x8, &(0x7f0000000080)=0x2, 0x4) 10:40:44 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1000000}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:44 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000000)) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000080)={0x3a, 0x8, 0xfffa}) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000100)="e0f2e69e206c527d43ae4803b9a9d7cfa53f017a29323c69d778206a2dbe549d967c27be7c8375cd519cd033ece1f51a0851f34855b30ea6b5c0c8c4ef2b2e125eb4557a2a7bea5e7bd3fe469b305225b6dac9e339d41497ef963b011a658344d431b702a3f8263fc59e53d53dd31a73", 0x70) 10:40:44 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r3) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000200)={r5, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000001c0)={r5, 0x3}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r6, 0x93, 0x10}, 0xc) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x70, 0x0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0xa85}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xf2fa}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 10:40:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="2800001314000100000000000000000400000000", @ANYRES32=r6, @ANYBLOB="08000200ac1414bb08000400ac1e0001"], 0x28}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x8997566b9514a8bf, 0x1, 0x0, [], r6, 0xffffffffffffffff, 0x1, 0x1, 0x200000}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r7}, 0xd) 10:40:44 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x35c, 0x0}}], 0x1, 0x10000, 0x0) 10:40:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x4000000}}, 0x80, 0x0}}], 0x2, 0x0) [ 280.387111][T18353] IPVS: ftp: loaded support on port[0] = 21 [ 280.405417][T18354] device bridge4 entered promiscuous mode 10:40:44 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 10:40:44 executing program 4: unshare(0x40600) r0 = open(&(0x7f0000000000)='.\x00', 0x10d00, 0x4c) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x3020420, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none='cache=none'}, {@access_any='access=any'}, {@uname={'uname', 0x3d, '-/(eth0$/vmnet1\'+@proc/.'}}, {@version_9p2000='version=9p2000'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '}-%selinux-systemwlan0em0userGPL*&-ppp1mime_typewlan0'}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_role={'obj_role', 0x3d, 'system,keyringselinux:%'}}, {@dont_measure='dont_measure'}]}}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) splice(r1, &(0x7f0000000240), r0, &(0x7f0000000280)=0x401, 0x55f, 0xc) 10:40:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x480, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xd0010100}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:44 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000100)={{0x4f, 0x9f}, {0x7, 0x5}, 0x1, 0x4, 0xa7}) r1 = open(&(0x7f00000000c0)='.\x00', 0x4e8400, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000000)=0x2, 0x4) ftruncate(r1, 0x4) 10:40:45 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:45 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x371, 0x0}}], 0x1, 0x10000, 0x0) 10:40:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000040)='./file0/file0\x00', r3}, 0x10) 10:40:45 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xeffdffff}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:45 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, &(0x7f0000000080)=0x1c) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r3, 0x1, 0x0, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8}, @GTPA_LINK={0x8}]}, 0x2c}}, 0x20000040) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r7, @ANYRES16=r6], 0x3}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="f6849a2b", @ANYRES16=r3, @ANYBLOB="000127bd7000fcdbdf2502000000080008000100000008000100", @ANYRES32=r7, @ANYBLOB="080002000000000008000400ac14140d"], 0x34}, 0x1, 0x0, 0x0, 0x404c050}, 0x0) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r8, 0x84, 0x12, &(0x7f0000000100), 0x4) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) bind$rose(r0, &(0x7f00000002c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x40) 10:40:45 executing program 4: unshare(0x40600) r0 = getpgrp(0xffffffffffffffff) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) rt_tgsigqueueinfo(r0, r2, 0x37, &(0x7f0000000100)={0x2c, 0x1, 0x4}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r6 = open(&(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0xaaf}, 0x8) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="0101000000000000000001000000440001000c00070000000000000000000c0006006c626c637200000008000b000000700008000800000000000800090000000000080001000a0000000800050002000000"], 0x58}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r6, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x84, r8, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa31b}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x41}, 0x40000004) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:45 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xf5ffffff}}, 0x80, 0x0}}], 0x2, 0x0) [ 281.320713][T18419] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 281.359505][T18419] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 10:40:45 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xfffffdef}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:45 executing program 1: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) unshare(0x40600) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCSIG(r0, 0x40045436, 0x39) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 281.398558][T18425] IPVS: ftp: loaded support on port[0] = 21 10:40:45 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) flistxattr(r1, &(0x7f00000001c0)=""/43, 0x2b) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x1, 0x1, 0x5, 0x7, 0x3}}) setsockopt$inet_tcp_buf(r2, 0x6, 0xb, &(0x7f0000000100)="c171946a57093486c24b28f0cc0965022d2fb8a0ada7fde72a3ba0baf9ae2d862150076258c17cfe264ae6fce7db9cdf7d591961509e7e83041a3cff57abb63e2eda5a3990da946bdbec6adfb598571b41e94a392d482bcca924f00b8e619728cce5331e36e3f12d1b7ccbc21338b5c0d8b93a688abed1df93cb27d9c234340ad5ba3811cc5bf6ddd780d856df1aa7cadbdfb2f33c1c650963ad02bed229c619c7ca6261e75b9c4d230a1b79ee146bba35ce9dce26833169ec9889110963", 0xbe) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) openat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x2) 10:40:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:45 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xffffff7f}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:46 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:46 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000080)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) statx(r1, &(0x7f0000000000)='./file0\x00', 0x2000, 0x8, &(0x7f0000000100)) 10:40:46 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000d, 0x7}) 10:40:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r4 = socket$inet_smc(0x2b, 0x1, 0x0) getpeername$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f0000000100)=0x10) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, r3, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x503980, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x8801, 0x0) r7 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r7) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r7, 0x84, 0x70, &(0x7f0000000200)={r9, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000200)={r9, 0x3f}, 0x8) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f00000002c0)={0x0, @bt={0x40, 0x5, 0x0, 0x7, 0x0, 0x80000000, 0xb45000, 0x200, 0xa5f, 0x6, 0x7f, 0x0, 0x8, 0x7, 0xb, 0x1a, {0x400, 0x20}, 0x7f, 0x40}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r5}, 0xd) 10:40:46 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x39a, 0x0}}], 0x1, 0x10000, 0x0) 10:40:46 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xfffffff5}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:46 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) socket$tipc(0x1e, 0x2, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:46 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 10:40:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x40) mount(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f00000000c0)='pstore\x00', 0x6939e75cf6833e1d, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r3}, 0xd) 10:40:46 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 282.449048][T18490] IPVS: ftp: loaded support on port[0] = 21 10:40:46 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$P9_RLERRORu(r0, &(0x7f0000000000)={0xf, 0x7, 0x1, {{0x2, ':a'}, 0xfffff8f6}}, 0xf) 10:40:46 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f00000001c0)={&(0x7f0000000100)={&(0x7f0000000080)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f0000000240)=0x18) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:47 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:47 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x3a0, 0x0}}], 0x1, 0x10000, 0x0) 10:40:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000380)={0x5, 0x1, 0x4, 0x100, 0x2, {r0, r1/1000+10000}, {0x3, 0x0, 0xe1, 0xfe, 0x2, 0x8, "710e1680"}, 0x8, 0x2, @offset=0x3, 0xffffb128, 0x0, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r3, 0x80184132, &(0x7f00000002c0)) bind$bt_l2cap(r2, &(0x7f0000000100)={0x1f, 0x5, @none, 0x9, 0x2}, 0xe) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$CAPI_INSTALLED(r2, 0x80024322) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x11, 0x7e, 0x6, 0x80, 0x61, r4, 0x14000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r5}, 0xd) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={r7, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300)={r7, 0xa97, 0x20}, &(0x7f0000000340)=0xc) 10:40:47 executing program 4: unshare(0x40600) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x420000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x20, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000000140)={0x4, 0x10, 0xfffffffd, 0xff}, &(0x7f0000000180)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0xfffffffffffffff9}}, 0x10) r1 = open(&(0x7f0000000300)='./file0\x00', 0x1d3901, 0x138) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000340)={0x9f0000, 0x3, 0x3ff, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9f0063, 0x7ff, [], @ptr=0x40000000000000}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:47 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x34, r1, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @multicast}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x34}}, 0x0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 283.462207][T18554] IPVS: ftp: loaded support on port[0] = 21 10:40:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x101d0}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:47 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000080)=0x4) 10:40:47 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000080)={0x6, "ddd26a8bb694dcce053fd3176d2e724b2b28a86fbd9e7b726fae49d2ba2f36f4", 0x2, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0xd) 10:40:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x40000}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:47 executing program 4: unshare(0x40600) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x2049c0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r4, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="2800000014000100000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08001000001414bb08000400ac1e0001"], 0x28}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}]}, 0x3c}}, 0x20040051) r5 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r3, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xa4, r7, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}]}, 0xa4}, 0x1, 0x0, 0x0, 0xb4bb8f259a49674a}, 0x40) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDCTL_DSP_GETBLKSIZE(r6, 0xc0045004, &(0x7f0000000080)) 10:40:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1000000}}, 0x80, 0x0}}], 0x2, 0x0) [ 284.174036][T18555] device bridge2 entered promiscuous mode [ 284.208284][T18579] device bridge2 entered promiscuous mode [ 284.252397][T18592] IPVS: ftp: loaded support on port[0] = 21 10:40:48 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xd000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:48 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4000000}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:49 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x3da, 0x0}}], 0x1, 0x10000, 0x0) 10:40:49 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x4a280, 0x0) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f00000001c0)={0x0, @motion_det}) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1, 0x1}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x10) 10:40:49 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000)=0x6, 0x1) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) syz_extract_tcp_res(&(0x7f0000000100), 0xd7a, 0x200) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000080)=0x4) 10:40:49 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xd0010100}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:49 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xe000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xeffdffff}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:50 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x4000000000012, 0xb, 0x4}) 10:40:50 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2a4, 0x0}}], 0x1, 0x10000, 0x0) 10:40:50 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x0, 0xa, 0x0, "fa168d62373bc19a495be5336aaed3a3a1dba34b643118ddfd9a68d4406097295664b91723b0ebb965657e2972808ec6f17af1a3b9008d61df3b966ce9f8465e2c5664cc5c958d18ee1149c23722d0ba"}, 0xd8) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f00000004c0)=0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$smackfs_netlabel(r3, &(0x7f0000000240)=@l2={{0xa5, 0x2e, 0xc9, 0x2e, 0x101, 0x2e, 0xffffffffffffff6b}, 0x2f, 0x3b52, 0x20, 'ppp0vmnet0trustedlouser@selinuxcpusetem0'}, 0x93) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x2092, &(0x7f0000000000)=[{0x400, 0x80, 0x6, 0x7fffffff}, {0x7, 0x8, 0x8, 0x7}]}) write$binfmt_script(r5, &(0x7f0000000100)={'#! ', './file0', [{}, {0x20, 'ppp0vmnet0trustedlouser@selinuxcpusetem0'}], 0xa, "91a1244d31e4697d5af8ee77eebc2b1446d35dbee05f407173a1e327b45a29624d4658c29b7ff1f1590aeae4a5905cf190acbdf52ffae00f8ec832efb52d733ab538d2a4ce37fd4e0859ec5e"}, 0x81) openat$fb0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fb0\x00', 0x210800, 0x0) [ 286.169677][T18647] IPVS: ftp: loaded support on port[0] = 21 10:40:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xf5ffffff}}, 0x80, 0x0}}], 0x2, 0x0) [ 286.342433][T18663] IPVS: ftp: loaded support on port[0] = 21 10:40:50 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000080)=0x4) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:50 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x3f2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xfffffdef}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:50 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = mq_open(&(0x7f0000000080)='\x00', 0x40, 0x100, &(0x7f0000000180)={0x3, 0x3, 0x8, 0x6}) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000100)="866dbabfa914f527719f56de515bdafe6ec3cbfdc08c06a21c4e74aa3549c9ed8fcba44fdb2732665c7f0129445fb077093f85b15f77386bafa72f9b40dc472ad4"}, 0x20) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000d, 0xb}) ftruncate(r2, 0x8) 10:40:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xffffff7f}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:50 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000200)=0xfff) unshare(0x40600) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'veth1_to_batadv\x00'}) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={r3, @in={{0x2, 0x4e24, @local}}}, 0x84) [ 286.670118][T18719] IPVS: ftp: loaded support on port[0] = 21 10:40:50 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:50 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1f2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xfffffff5}}, 0x80, 0x0}}], 0x2, 0x0) 10:40:50 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x200c41, 0x40) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0x7f, 0x1}) 10:40:50 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x3fa, 0x0}}], 0x1, 0x10000, 0x0) 10:40:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x10, 0x0}}], 0x2, 0x0) [ 287.108474][T18762] IPVS: ftp: loaded support on port[0] = 21 [ 287.117222][T18763] IPVS: ftp: loaded support on port[0] = 21 10:40:51 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r4, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x8001, 0x5, 0x8, 0xc8, 0xffffffffffffffff, 0x4, [], r4, r0, 0x7, 0x2, 0x5}, 0x40) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x20000640, 0x0}}], 0x2, 0x0) [ 287.280790][T18786] device bridge3 entered promiscuous mode 10:40:51 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x5002, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000180)={0x1, 0x0, {0x5, 0x8000, 0xe2a, 0x8}}) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) read(r2, &(0x7f0000000100)=""/118, 0x76) 10:40:51 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x3f2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:51 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x500, 0x0}}], 0x1, 0x10000, 0x0) 10:40:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x4}}], 0x2, 0x0) [ 287.607543][T18830] IPVS: ftp: loaded support on port[0] = 21 [ 287.621999][T18831] IPVS: ftp: loaded support on port[0] = 21 10:40:51 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x11000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:51 executing program 4: unshare(0x40600) memfd_create(&(0x7f0000000000)='{GPLself#selfvmnet1:\x00', 0x1) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x101d0}}], 0x2, 0x0) 10:40:51 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1f2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:51 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x600, 0x0}}], 0x1, 0x10000, 0x0) 10:40:52 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000000)={0x400000000000e, 0xb}) [ 288.056326][T18889] IPVS: ftp: loaded support on port[0] = 21 [ 288.092009][T18891] IPVS: ftp: loaded support on port[0] = 21 10:40:52 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x40000}}], 0x2, 0x0) 10:40:52 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000300)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="0e000000", @ANYRES16=r1, @ANYBLOB="00022dbd7000fddbdf250500000006000b00110000001400010073656c662a6370757365747573657200"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r1, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_DOMAIN={0x10, 0x1, '.vboxnet1/$\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_FAMILY={0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0xc000) unshare(0x40600) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r3, 0x4112, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:52 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x1000000}}], 0x2, 0x0) 10:40:52 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8002, 0x0) r2 = getpgrp(0x0) socket$pptp(0x18, 0x1, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) sched_setattr(r4, &(0x7f0000001480)={0x38, 0x5, 0x10000011, 0x200, 0x7, 0x7, 0x100, 0x5, 0x73f, 0x9}, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f00000014c0)=0x401) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000001440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001400)={&(0x7f0000000100)={0x12ec, 0x27, 0x8, 0x70bd2c, 0x25dfdbff, {0x14}, [@typed={0x14, 0x42, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @nested={0x12a1, 0x3, 0x0, 0x1, [@generic="4a3ea6e449111225029426bf06edce4198dc20db757cbab46b8e6b4ffc9cb75b292023b78ba049f26fa5b790491920a6e782409028114e38bf21ad3ee2ec91d08bf730943de6bee9a707d80a93d2157b8cef257d32dc937604b7a7eb1829ea871874a07d9038a4b46f3b3dd638397241eb8adfa315d11a2b193d2101c23da3db8d69c80dc30035d252c8cd86e7dfaa6cf6140b2bcce01cf8f82adcb8ba8587615c8017d4a6eedf42ad3eca3d3ec33dfe", @generic="94bb44c503b4d70c551601670ce6916f6badcafe4d510288a1", @typed={0xc, 0x5f, 0x0, 0x0, @u64}, @typed={0x8, 0x79, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x31}}, @typed={0xc, 0x13, 0x0, 0x0, @u64}, @generic="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", @generic="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", @generic="4e9a5b1def4253ed2918b2d699d3ec50fab6e026140dc795bf58e3b61531738dd07f65d1a8c3c090c5604cba4fb928d174a595d8a0bc1af49de55c4020fb163d38120db1fcad9268d9cf7637fc74410ee72eda2183679c4adb3b9e63b7e0182823e1f5883d9ce5de5929d7120803367594a6feddcb899d125a4ae5352660ee57d2138661b9aac1c6f9c0ba10e2f95d96c1ac2ea5cbe962f4266f5565a6be62c272bebb1b75b8ae70414f19804550255e6fbf58f57b8baba253"]}, @typed={0x8, 0x32, 0x0, 0x0, @pid=r2}, @nested={0x18, 0x91, 0x0, 0x1, [@typed={0xc, 0x82, 0x0, 0x0, @str='vmnet1%\x00'}, @typed={0x8, 0x24, 0x0, 0x0, @pid=r3}]}]}, 0x12ec}, 0x1, 0x0, 0x0, 0x8000}, 0x40800) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:52 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1f2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:52 executing program 1: socket(0x22, 0x1, 0x2) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x345001, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x4000000}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r2}) recvfrom$unix(r3, 0x0, 0x3b1472672b4e55b5, 0x80002021, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000000140)=""/147) unshare(0x40600) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000000)={0x77, 0xd}) r6 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x3, 0x2) ioctl$VIDIOC_S_INPUT(r6, 0xc0045627, &(0x7f0000000240)=0x6) [ 288.507717][T18961] IPVS: ftp: loaded support on port[0] = 21 10:40:52 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x12000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:52 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x4000000}}], 0x2, 0x0) 10:40:52 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x601, 0x0}}], 0x1, 0x10000, 0x0) 10:40:52 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:52 executing program 1: unshare(0x40600) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000)={0x3, 0x7f}, 0x2) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r1, 0xc0044d0e, &(0x7f0000000100)=0x5f) 10:40:52 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1f2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:52 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xd0010100}}], 0x2, 0x0) 10:40:53 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x84) ioctl$FBIO_WAITFORVSYNC(r0, 0x40044620, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 289.043516][T18999] IPVS: ftp: loaded support on port[0] = 21 [ 289.054086][T19003] IPVS: ftp: loaded support on port[0] = 21 10:40:53 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="904af8aecdb847371a94fc852084df6a", 0x10) 10:40:53 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xeffdffff}}], 0x2, 0x0) 10:40:53 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_dev$vcsa(&(0x7f00000028c0)='/dev/vcsa#\x00', 0x2, 0x14440) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000002900)=0x5, &(0x7f0000002940)=0x1) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/42, 0x2a}, {&(0x7f0000000100)=""/142, 0x8e}, {&(0x7f00000001c0)=""/170, 0xaa}, {&(0x7f0000000280)=""/145, 0x91}, {&(0x7f0000000340)=""/155, 0x9b}], 0x5, &(0x7f0000002840)=[{&(0x7f0000000480)=""/231, 0xe7}, {&(0x7f0000000580)=""/246, 0xf6}, {&(0x7f0000000080)=""/46, 0x2e}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/137, 0x89}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/252, 0xfc}], 0x7, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:53 executing program 1: unshare(0x40600) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000100)=0x8) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@multicast2, @rand_addr, @remote}, &(0x7f0000000080)=0xc) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0x3}) 10:40:53 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:53 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1f2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:53 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xf5ffffff}}], 0x2, 0x0) 10:40:53 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x603, 0x0}}], 0x1, 0x10000, 0x0) 10:40:53 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000000)=0x101, 0x4) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000280)={{0x81, 0x40}, 'port1\x00', 0x40, 0x101008, 0x3, 0xffffc752, 0x34f, 0x9, 0x8000, 0x0, 0x3}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)=""/155, &(0x7f0000000080)=0x9b) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="e1683bb9a74f43882935c3205f51c9c1"}, {0xa, 0x0, 0x0, @rand_addr="f2f909879815e4f0540ff0002573bbb9"}, r4}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x2, {0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, r4}}, 0x38) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:53 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000080)={0x100000001, 0xb}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) 10:40:53 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xfffffdef}}], 0x2, 0x0) 10:40:54 executing program 1: unshare(0x800) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:54 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xffffff7f}}], 0x2, 0x0) [ 290.097118][T19094] IPVS: ftp: loaded support on port[0] = 21 [ 290.113041][T19095] IPVS: ftp: loaded support on port[0] = 21 10:40:54 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000100)) unshare(0x40600) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:54 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xfffffff5}}], 0x2, 0x0) 10:40:54 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000000)=0xfffffffd) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:54 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:54 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1f2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x14000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001180)={0x1c, r2, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r2, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, [], 0x38}}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xfffffffffffffff9}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x8040) unshare(0x40600) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x6, 0x8000000000000011, 0x1f}) sendto$inet6(r4, &(0x7f0000000000)="ac9e832604b5a63c6d94914ebe5a5be7a033c17c620f8c07bb25849206af46abdaf8475840e9d6db240afc365105d6", 0x2f, 0x48010, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast2, 0x7f}, 0x1c) 10:40:54 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x4000000000000}}], 0x2, 0x0) 10:40:54 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x700, 0x0}}], 0x1, 0x10000, 0x0) 10:40:54 executing program 1: write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x6, {0x7fff}}, 0x18) unshare(0x2040600) r0 = open(&(0x7f0000000000)='./file0\x00', 0x400c1, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xffffffff9121ca6f}) 10:40:55 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x101, 0x4, {0x6, 0x6, 0x6b63, 0x8c}}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:55 executing program 1: unshare(0x40600) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x3, 'ipvlan0\x00', {0x2}}) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 291.083897][T19179] IPVS: ftp: loaded support on port[0] = 21 [ 291.102098][T19184] IPVS: ftp: loaded support on port[0] = 21 10:40:55 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x100000000000000}}], 0x2, 0x0) 10:40:55 executing program 4: unshare(0x40600) r0 = open(&(0x7f0000000000)='./file0\x00', 0x101240, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:55 executing program 1: unshare(0x40600) r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0x8) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:55 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x400000000000000}}], 0x2, 0x0) [ 291.439463][T19182] IPVS: ftp: loaded support on port[0] = 21 10:40:55 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x25000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:58 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1f2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:58 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) io_setup(0x6, &(0x7f0000000000)) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0xa40, 0x0) ioctl$MON_IOCT_RING_SIZE(r3, 0x9204, 0xb8ef) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000100)={0xa, 0x0, [{0x528, 0x1, 0x0, 0x0, @irqchip={0x9, 0x40}}, {0x2, 0x4, 0x0, 0x0, @sint={0x1c, 0x401}}, {0x5, 0x4, 0x0, 0x0, @sint={0x7fffffff, 0x8000}}, {0x7fff, 0x4, 0x0, 0x0, @irqchip={0x4, 0x20}}, {0x0, 0x2, 0x0, 0x0, @sint={0x654, 0x98c4}}, {0x9, 0x4, 0x0, 0x0, @msi={0x1, 0x89, 0x4, 0x6e82bf59}}, {0x1000, 0x1, 0x0, 0x0, @adapter={0xf3f, 0x2, 0x6, 0x7, 0x8}}, {0x7, 0x3, 0x0, 0x0, @msi={0x2, 0x79a2, 0xdf3, 0x8}}, {0x1bdf, 0x1, 0x0, 0x0, @adapter={0x80000000, 0x2, 0xffff, 0x814, 0x8}}, {0x9, 0x3, 0x0, 0x0, @adapter={0x0, 0x3, 0xa8, 0x1, 0xdea}}]}) r4 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyprintk\x00', 0x80840, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000000000095000000000000000100000000000000", @ANYRES32, @ANYBLOB="00000000d60000000000000000000000000000000000100000000000"]) ioctl$TCSETX(r4, 0x5433, &(0x7f0000000300)={0x7, 0x4, [0x0, 0x401, 0x9, 0x4, 0x9], 0x7}) 10:40:58 executing program 4: unshare(0x40600) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000000)) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000100)=""/52) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) bind$pptp(r2, &(0x7f0000000080)={0x18, 0x2, {0x1, @rand_addr=0x10000}}, 0x1e) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x900, 0x0}}], 0x1, 0x10000, 0x0) 10:40:58 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x8000000000000000}}], 0x2, 0x0) 10:40:58 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) [ 294.640785][T19298] IPVS: ftp: loaded support on port[0] = 21 10:40:58 executing program 4: unshare(0x40600) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r1) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r3) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, r3) keyctl$search(0xa, r1, &(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x1}, r3) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SOUND_MIXER_READ_VOLUME(r5, 0x80044d0e, &(0x7f0000000000)) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:58 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xd001010000000000}}], 0x2, 0x0) 10:40:58 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000100)={0x2, 0x2, {0x2, 0x0, 0x8000, 0x1, 0x8}, 0x932b}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000061420002cbd7000fcdbdf250800010001090042000c000100020000000800010000000000080001008000"/56], 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x4040000) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsa\x00', 0x220000, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r3, 0xc02064b9, &(0x7f00000002c0)={&(0x7f0000000240)=[0x10000, 0x6225, 0x3, 0x9, 0x4], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 294.808153][T19319] IPVS: ftp: loaded support on port[0] = 21 10:40:58 executing program 4: unshare(0x40600) r0 = open(&(0x7f0000000000)='./file0\x00', 0x52340, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = dup3(r0, r1, 0x80000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$TUNSETOWNER(r2, 0x400454cc, r4) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = msgget(0x1, 0xd0) msgrcv(r5, &(0x7f00000002c0)={0x0, ""/4096}, 0x1008, 0x2, 0x3000) 10:40:58 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xeffdffff00000000}}], 0x2, 0x0) 10:40:58 executing program 3: unshare(0x40600) r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0x8) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:58 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) socketpair(0xc51bf39186e936e8, 0x6, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) 10:40:59 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xf5ffffff00000000}}], 0x2, 0x0) 10:40:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x1e9e) 10:40:59 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x9b1, 0x0}}], 0x1, 0x10000, 0x0) 10:40:59 executing program 3: unshare(0x40600) r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0x8) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 295.367818][T19387] IPVS: ftp: loaded support on port[0] = 21 10:40:59 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:40:59 executing program 4: unshare(0x40600) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x2, 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x4000, 0x1, {r0}, {r2}, 0xdefa, 0x8000}) getpgrp(r3) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000002c0)='./file0\x00', 0x408400, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) bind$x25(r5, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$USBDEVFS_GETDRIVER(r6, 0x41045508, &(0x7f0000000100)={0x20, "e1224feeff2a2b9a16270173072c3738abc3323bf2b737384d3814f6292b7d66a15a831bd8c624d6c557149e926cbf40b76bf9d0007b3ee7e40561b0df0799347284ca74b053bb6d687a8dd1d8f4537e2ccd0de41afc656267c4e1e92ace6d33b0042c58b7d9f237dd4aae0aff5006a1830988766607ff563e3cfac47b1bf0fb38520450489c61450f2e58d1e95685028605edac7999f0fac9146686c91ed80f5d19c134ca8d3bed1a4ad2bf8fdd186e87e1a23582f2150c12f440af3954807488b8fab7562cc9015094e1f011109f29c9e62b6244a9b1a9737dbf6e99c47d0c1c51496fe39db2b36fca64aeb51265ec5e20f62431c3de09391d780ac96172f8"}) 10:40:59 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xffffff7f00000000}}], 0x2, 0x0) 10:40:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace(0x11, r1) 10:40:59 executing program 3: unshare(0x40600) r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0x8) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:59 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x9b2, 0x0}}], 0x1, 0x10000, 0x0) 10:40:59 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0xffffffff00000000}}], 0x2, 0x0) 10:40:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000b, 0xb}) [ 295.731516][T19427] IPVS: ftp: loaded support on port[0] = 21 10:40:59 executing program 4: unshare(0x40600) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x7ff, 0x2}, 0xc) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:40:59 executing program 3: unshare(0x40600) r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0x8) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) 10:40:59 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0) 10:40:59 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/time_for_children\x00') fcntl$dupfd(r0, 0x0, r2) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:00 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:00 executing program 4: unshare(0x40600) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r3, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e23, 0x0, @mcast2, 0x2}}}, 0x84) ioctl$BLKRRPART(r0, 0x125f, 0x0) r4 = open(&(0x7f00000001c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x8) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FIBMAP(r5, 0x1, &(0x7f0000000080)=0xb880000) 10:41:00 executing program 3: unshare(0x40600) r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0x8) 10:41:00 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x101d0}}], 0x2, 0x0) 10:41:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xa00, 0x0}}], 0x1, 0x10000, 0x0) 10:41:00 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x1, 0x1) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f0000000b00)=""/4096) semctl$IPC_RMID(r1, 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000100)={{0x2, 0x0, @descriptor="57068e7231edb8f4"}, 0x1d, [], "0420b2081e5058dd4c04bd6b0e98d2430671c910b695ec41de4c912e33"}) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='vmnet1-\'trustedvmnet1mime_typemime_typesecuritymime_typesystem!\x00') 10:41:00 executing program 3: unshare(0x40600) r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:00 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x40000}}], 0x2, 0x0) 10:41:00 executing program 1: unshare(0x40600) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) fanotify_init(0x10, 0x800) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0x2b, 0x7d3}) [ 296.715505][T19491] IPVS: ftp: loaded support on port[0] = 21 10:41:00 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000000)=0xcb) unshare(0x40600) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000000"]) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0xe) open(&(0x7f0000000080)='./file0\x00', 0x595980, 0x8) 10:41:00 executing program 3: unshare(0x40600) r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) 10:41:00 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x1000000}}], 0x2, 0x0) 10:41:01 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:01 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x10000, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x80001, 0x84) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x24, 0x0, 0x711, 0x0, 0x5, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x24}}, 0x90) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9a}]}, 0x34}, 0x1, 0x0, 0x0, 0x24000011}, 0x4002800) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000200)={r7, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000100)=r7, 0x4) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet_sctp_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000000)={0x1, 0x3f, 0x81, 0x8, 0x8, 0x8, 0x5, 0x9, 0x9a, 0x1, 0xb4, 0x40, 0x1, 0x6}, 0xe) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:01 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x8) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xa02, 0x0}}], 0x1, 0x10000, 0x0) 10:41:01 executing program 3: unshare(0x40600) r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) 10:41:01 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x4000000}}], 0x2, 0x0) 10:41:01 executing program 3: unshare(0x40600) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) 10:41:01 executing program 3: unshare(0x40600) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) 10:41:01 executing program 1: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e22, @broadcast}, 0x22, 0x0, 0x0, 0x0, 0x1f, &(0x7f0000000000)='syz_tun\x00', 0x2, 0x203c, 0x5}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='(@\'+.\'\x00') ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x9, 0x9, 0x80000000}) [ 297.697276][T19555] IPVS: ftp: loaded support on port[0] = 21 10:41:01 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SOUND_MIXER_INFO(r0, 0x805c4d65, &(0x7f0000000100)) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:01 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xd0010100}}], 0x2, 0x0) 10:41:01 executing program 3: unshare(0x40600) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) 10:41:02 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:02 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x7f) 10:41:02 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xeffdffff}}], 0x2, 0x0) 10:41:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xb00, 0x0}}], 0x1, 0x10000, 0x0) 10:41:02 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) recvfrom$unix(r0, &(0x7f0000000100)=""/196, 0xc4, 0x40002042, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:02 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) 10:41:02 executing program 3: socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) [ 298.633568][T19618] IPVS: ftp: loaded support on port[0] = 21 10:41:02 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xf5ffffff}}], 0x2, 0x0) 10:41:02 executing program 1: unshare(0x40600) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@remote, @remote, 0x1, 0x3, [@dev={0xac, 0x14, 0x14, 0x2c}, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, 0x1c) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x1bc, 0x0, 0x8, 0x70bd26, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6}}]}, 0x1bc}}, 0x0) close(r5) write$binfmt_elf64(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"/1031], 0x3f4) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000200)={r7, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0xffffffffffffff05) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000080)={r7, 0x0, 0x20}, 0x8) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:02 executing program 3: socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) 10:41:02 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xfffffdef}}], 0x2, 0x0) [ 298.874034][ T23] audit: type=1804 audit(1585478462.805:4): pid=19635 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir575870567/syzkaller.hFe9Th/312/file0" dev="sda1" ino=16114 res=1 10:41:02 executing program 3: socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) [ 298.987544][ T23] audit: type=1804 audit(1585478462.805:5): pid=19635 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir575870567/syzkaller.hFe9Th/312/file0" dev="sda1" ino=16114 res=1 10:41:03 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:03 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x2, 0x0) 10:41:03 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, &(0x7f0000000100)) 10:41:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xc00, 0x0}}], 0x1, 0x10000, 0x0) 10:41:03 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xfffffff5}}], 0x2, 0x0) 10:41:03 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, 0x0) [ 299.702649][T19681] IPVS: ftp: loaded support on port[0] = 21 10:41:03 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x4000000000000}}], 0x2, 0x0) 10:41:03 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1ce, 0x0}}], 0x1, 0x10000, 0x0) 10:41:03 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x2, 0x0) [ 299.986546][T19710] IPVS: ftp: loaded support on port[0] = 21 10:41:04 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xc01, 0x0}}], 0x1, 0x10000, 0x0) 10:41:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x400000000000000}}], 0x2, 0x0) 10:41:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x8000000000000000}}], 0x2, 0x0) [ 300.207147][T19732] IPVS: ftp: loaded support on port[0] = 21 10:41:04 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:04 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x19c, 0x0}}], 0x1, 0x10000, 0x0) 10:41:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xd001010000000000}}], 0x2, 0x0) 10:41:04 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xd00, 0x0}}], 0x1, 0x10000, 0x0) 10:41:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xeffdffff00000000}}], 0x2, 0x0) [ 300.677303][T19779] IPVS: ftp: loaded support on port[0] = 21 [ 300.704036][T19782] IPVS: ftp: loaded support on port[0] = 21 10:41:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xf5ffffff00000000}}], 0x2, 0x0) 10:41:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xffffff7f00000000}}], 0x2, 0x0) 10:41:05 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x162, 0x0}}], 0x1, 0x10000, 0x0) 10:41:05 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x2, 0x0) [ 301.164809][T19839] IPVS: ftp: loaded support on port[0] = 21 10:41:05 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:41:05 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0) 10:41:05 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x162, 0x0}}], 0x1, 0x10000, 0x0) 10:41:05 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xe00, 0x0}}], 0x1, 0x10000, 0x0) [ 301.588031][T19876] IPVS: ftp: loaded support on port[0] = 21 10:41:05 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0x101d0}}], 0x2, 0x0) 10:41:05 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x2, 0x0) [ 301.763475][T19892] IPVS: ftp: loaded support on port[0] = 21 [ 301.826695][T19894] IPVS: ftp: loaded support on port[0] = 21 10:41:05 executing program 4: unshare(0x54060c80) r0 = open(&(0x7f00000000c0)='.\x00', 0x440802, 0x44) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x100) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4981, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$SMC_PNETID_ADD(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, r4, 0xa00, 0x70bd29, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40880}, 0x4005000) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmsg$RDMA_NLDEV_CMD_RES_GET(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="1890441a4e3de2ed8a17dc8900d9000000be0e67d465a571b0a9012abd7000"/43], 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x800) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) fstatfs(r5, &(0x7f0000000100)=""/223) 10:41:05 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000}}], 0x2, 0x0) 10:41:05 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x162, 0x0}}], 0x1, 0x10000, 0x0) 10:41:06 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000000}}], 0x2, 0x0) [ 302.174541][T19952] IPVS: ftp: loaded support on port[0] = 21 10:41:06 executing program 4: unshare(0x10060380) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) timerfd_settime(r1, 0x0, &(0x7f0000000140)={{}, {0x77359400}}, &(0x7f0000000180)) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)={0x9, 0x1, 0x3b9, 0x20, 0x18, "607f6dbc0d6a68dc"}) io_setup(0x8, &(0x7f0000000000)) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000080)) 10:41:06 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0xd0010100}}], 0x2, 0x0) 10:41:06 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}}], 0x2, 0x0) 10:41:06 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff}}], 0x2, 0x0) 10:41:06 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:08 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0xf00, 0x0}}], 0x1, 0x10000, 0x0) 10:41:08 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, 0x0) 10:41:08 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffdef}}], 0x2, 0x0) 10:41:08 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0xa30000, 0x3b, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x990a65, 0x7ff, [], @value=0xc16}}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x200, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f0000000180)={0x4, 0x40, 0x401, r5, 0x0, &(0x7f0000000140)={0x9b090b, 0x7, [], @ptr=0x101}}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r6, 0xc0bc5310, &(0x7f0000000540)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2000, 0x0) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000400)={&(0x7f0000000200)="863f8b425942fde49c9b693c6c91a7bc9948ea1750", &(0x7f0000000240)=""/19, &(0x7f0000000280)="eecf635eaf6114ad8cb64532bf82cf5bec5d42aa40192cba84c89f9f30329d7f0190b85a702821e20ea7991d5018ffd7995c5c98499e4ab1e0c90ebd26a8348b0629f68b2b85f61e81157250226983e0bfdbfb54f8d9e43ad7729e964c6f360af34653be50e382b0eb2cd4951902a10b793cc7e099a1fbe378d076283c461c518ff11c841c48ee4b303f08c168cdb9535fb3ddce82476630b7b00d6c287e8cabc6eab8e6a914e59ebbeeb1631955ad1d9acdd4cd6a207472cd32ff62bb10ff3d176979", &(0x7f0000000380)="7949d01e3c0816da995714148c3b5049cfd116c5d1082a78f2cce548f61d781f1133a8a253cd90e0d80f6e57f8352a53a5c1841dc03f32d7ce0409b269de5fc87da6e1bb8fadb48e9aab870046d421111dd110e04b3b2f709484cb19b184e151e34318", 0xf87c, r1, 0x4}, 0x38) 10:41:08 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x141200, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x1}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f00000000c0)={r3, 0x1}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000080)={r3, 0x1}) open(&(0x7f00000001c0)='./file0\x00', 0x486c00, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000180)={0x6, 0x40000000d, 0x4000000001}) close(0xffffffffffffffff) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x20, @rand_addr="00ae6e3fe7e1b67261bba7470d015852"}}, [0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000100)={r5, 0x1f}, &(0x7f0000000140)=0x8) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x10) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000000000)=0x7fff) prctl$PR_MCE_KILL_GET(0x22) 10:41:08 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x2, 0x0) 10:41:09 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, 0x0) 10:41:09 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000f, 0xb}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) 10:41:09 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r3, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000000)={r3, 0x1ff, 0x1e, "ee743b777da5c547f9377a05a2885f114e6bc0e04cc91296066ab463c4e9"}, 0x26) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 305.100268][T20038] IPVS: ftp: loaded support on port[0] = 21 10:41:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}}], 0x2, 0x0) 10:41:09 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x40002, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f0000000080)='veth1_vlan\x00'}) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000200)={0x400000000000e, 0xb}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0xfffffffb, 0x4) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000140)={0x4, 0x0, [], {0x0, @reserved}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x301000, 0x0) getpeername$inet(r1, 0x0, 0x0) 10:41:09 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r0, 0x40044103, &(0x7f0000000000)=0x1) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:09 executing program 4: unshare(0x40600) openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/load2\x00', 0x2, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0xfffffffffffffffe}) 10:41:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 10:41:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1100, 0x0}}], 0x1, 0x10000, 0x0) 10:41:09 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) connect$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, 0x10) getpeername$inet(r0, 0x0, 0x0) socket$inet6(0xa, 0x80000, 0x6) [ 305.596314][T20099] IPVS: ftp: loaded support on port[0] = 21 10:41:09 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:09 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt(r0, 0x3df5e474, 0xab46, &(0x7f0000000000)=""/15, &(0x7f0000000080)=0xf) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:09 executing program 1: unshare(0x40600) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r3, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e21, 0x101, @mcast2, 0xfffffffc}}, 0x80000000, 0x4, 0x12, 0xfffffffc, 0x1f}, &(0x7f00000001c0)=0xfffffffffffffeef) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x6, 0x3, 0x4, 0x9, 0x10001, 0x1, 0x77d8, 0xff, r4}, 0x20) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000180)={0xf000, 0x4000, 0x7, 0x20}) 10:41:09 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000200)={r4, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={r4, 0xfff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={r5, 0x35a}, &(0x7f00000000c0)=0x8) getpeername$inet(r0, 0x0, 0x0) 10:41:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0x4}], 0x2, 0x0) 10:41:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1200, 0x0}}], 0x1, 0x10000, 0x0) 10:41:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0x101d0}], 0x2, 0x0) [ 306.017729][T20140] IPVS: ftp: loaded support on port[0] = 21 10:41:10 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000040e, 0x5}) 10:41:10 executing program 1: r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x1) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) poll(&(0x7f0000000080)=[{r1, 0x4000}, {r2, 0x80}, {r0, 0x8}, {r0, 0x8050}, {r3, 0x8008}, {0xffffffffffffffff, 0x2000}, {r0, 0x4022}, {r0, 0x202}], 0x8, 0x200) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 10:41:10 executing program 4: unshare(0x40600) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0x9d0000, 0x8, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9909db, 0x2, [], @ptr=0x4}}) keyctl$join(0x1, &(0x7f00000001c0)={'syz', 0x0}) ioctl$SNDCTL_DSP_POST(r2, 0x5008, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) connect(r3, &(0x7f0000000140)=@nl=@kern={0x10, 0x0, 0x0, 0x80000000}, 0x80) 10:41:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0x40000}], 0x2, 0x0) 10:41:10 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x4001) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0x1}) mmap$snddsp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x2010, r1, 0x9000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0xdda966b8990580cc, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) kcmp(0x0, 0x0, 0x0, r2, 0xffffffffffffffff) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) 10:41:10 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0x1000000}], 0x2, 0x0) 10:41:10 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1403, 0x0}}], 0x1, 0x10000, 0x0) 10:41:10 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x100) getpeername$inet(r0, 0x0, 0x0) 10:41:10 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x800) ioctl(r1, 0xfffffff7, &(0x7f0000000140)="a95838ab2619ae5249b175704eef12269932ccb53b496cb43ab7d551de08f080d4382a85781f5f19725e205d7806a7e2f228cb980f76f068e96560067120c268696847dc415bd396d8b2e26f13b31b5fc4de383b8b") ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000000)={0x2010}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffff80000000) 10:41:10 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000080)={0x400000000000e, 0xb}) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000400)) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) write$UHID_CREATE(r2, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/222, 0xde, 0x7, 0x6, 0xff, 0x7, 0x7}}, 0x120) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000340)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = dup2(r5, r3) ioctl$UI_SET_PROPBIT(r6, 0x4004556e, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000440)=0x20, &(0x7f0000000480)=0x4) 10:41:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0x4000000}], 0x2, 0x0) 10:41:11 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) fspick(r1, &(0x7f0000000000)='./file0\x00', 0x0) getpeername$inet(r0, 0x0, 0x0) [ 307.022776][T20208] IPVS: ftp: loaded support on port[0] = 21 10:41:11 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000100)={0x8, 0x0, [{0x9bc, 0x0, 0x2}, {0xbb6, 0x0, 0xab3}, {0xacc, 0x0, 0x4}, {0xb52, 0x0, 0x3}, {0xdc1, 0x0, 0xfdbb}, {0x397, 0x0, 0x8}, {0xae8}, {0x8de, 0x0, 0x4}]}) 10:41:11 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0xd0010100}], 0x2, 0x0) 10:41:11 executing program 1: unshare(0x40600) open(&(0x7f00000000c0)='./file0\x00', 0x656942, 0x15d) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x14, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000100)={0x1000, 0xb, 0x100000000}) 10:41:11 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = semget$private(0x0, 0x1, 0x1) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f0000000b00)=""/4096) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x5, 0x200]) getpeername$inet(r0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@local, @local, 0x0, 0x7, [@multicast2, @loopback, @broadcast, @loopback, @dev={0xac, 0x14, 0x14, 0x14}, @loopback, @broadcast]}, 0x2c) 10:41:11 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:11 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0x13, 0x6, 0xfffa}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r2, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='/bdev\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r1, 0x0, 0x1, &(0x7f0000000040)='\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)='net/udp\x00', r3}, 0x30) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) open_by_handle_at(r4, &(0x7f0000000240)={0x6f, 0x8, "31defc0eaeff9231a6bb6bf65acbd0943a73614067946483117dd37e25e803caff0d58e04a1cce819b18344693bb87333cec50ea847394c360ce1bb17998656b70641e4dcc0a3d50e2fa605db5917a537a48b23390ea4104a29686a75297ca10b04bfa84cd7136"}, 0x502240) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r3}, 0xc) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$DRM_IOCTL_AGP_FREE(r5, 0x40206435, &(0x7f0000000000)={0x6, 0x0, 0x0, 0xffff}) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:11 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0xeffdffff}], 0x2, 0x0) 10:41:11 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = open(&(0x7f0000000100)='./file0\x00', 0x58d382, 0x6) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getpeername$inet(r0, 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000080)=""/35) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x4, 0x4) 10:41:11 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x14ec, 0x0}}], 0x1, 0x10000, 0x0) 10:41:11 executing program 1: unshare(0x40600) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$erofs(&(0x7f0000000100)='erofs\x00', &(0x7f0000000140)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000180)="1eb73d403741e4632ad73279cec10ad7502d29f70f5b538c4f1ab255e0ae7d2f7a3f9832d55ee67b6b439d6c38629611e2e5ae5d9fc75e9310d86add69e0e0d61535394e594c01e6b21ad5a0cc5997bcd3524b3f0270461975631e2ea6f566073bcf67e8dc91e3e5dbc29644aaa40aea575096bec8286183f28311cd57dcfa2061106ba7fd75c2d08ee964547833f66c51a9776a301674a4921f28e147b7c53a293b6008fa54f8896dc567aad60c61e39c4b6931b8ac8ef317893d88b132f52fc394720f3a434340240153f3201943426cfb2e98ef13b637", 0xd8, 0xffffffffffffffff}], 0x100c04, &(0x7f00000002c0)={[{@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@fowner_eq={'fowner', 0x3d, r1}}]}) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0xc0000) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x480000) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 308.019046][T20275] IPVS: ftp: loaded support on port[0] = 21 10:41:12 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x68) 10:41:12 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0xf5ffffff}], 0x2, 0x0) 10:41:12 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0xfffffdef}], 0x2, 0x0) 10:41:12 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) uselib(&(0x7f00000001c0)='./file0\x00') r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$int_in(r1, 0x5421, &(0x7f0000000100)=0x5) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000080)=0x4) unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x2}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) getpgrp(r3) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000140)='proc^.bdev!\x00', &(0x7f0000000180)='./file0\x00', r0) 10:41:12 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) 10:41:12 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1600, 0x0}}], 0x1, 0x10000, 0x0) [ 308.748414][T20329] IPVS: ftp: loaded support on port[0] = 21 10:41:12 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:13 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) fchdir(r1) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000100)=""/134) 10:41:13 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0xffffff7f}], 0x2, 0x0) 10:41:13 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000040)={0x2, 0x2, 0x4, 0x2000, 0xd2, {0x77359400}, {0x5, 0x0, 0x8, 0x3, 0x3f, 0x1, "7ad57f5a"}, 0x8, 0x2, @planes=&(0x7f0000000000)={0x2, 0x1, @userptr=0x9, 0x1}, 0x8000, 0x0, r0}) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f00000000c0)={0x8275, 0x15, [{0x5}, {0xf}, {0x2}, {}, {0xe, 0x1}, {0x3}, {}, {0xf}, {0x9, 0x1}, {0x4}, {0x4, 0x1}, {0x5}, {0x1}, {0x8, 0x1}, {0x6, 0x1}, {0x3, 0x1}, {0x1}, {0x6}, {0xd, 0x1}, {0x7}, {0x1}]}) r2 = socket$l2tp(0x2, 0x2, 0x73) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getpeername$inet(r2, 0x0, 0x0) 10:41:13 executing program 1: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$KVM_SMI(r1, 0xaeb7) 10:41:13 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1e01, 0x0}}], 0x1, 0x10000, 0x0) 10:41:13 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000100)=0x4000) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:13 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}, 0xfffffff5}], 0x2, 0x0) 10:41:13 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = open(&(0x7f0000001040)='.\x00', 0x80402, 0x38) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x200a, 0xb, 0x3}) sendto$inet(r0, &(0x7f0000000000)="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", 0x1000, 0x81, &(0x7f0000001000)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 309.313747][T20374] IPVS: ftp: loaded support on port[0] = 21 10:41:13 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getpeername$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000180)={0x5, 0x151}) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000000)) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:13 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x4, 0x0) 10:41:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r0, 0x10e, 0xb, &(0x7f0000000100)="00000002", 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000080)=0x3, 0x4) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="23000000190007041dfffd946f610500020000001f00000000000800050016000400ff", 0x23}], 0x1}, 0x0) unshare(0x40600) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:13 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:13 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x74, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @dev={[], 0x24}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @local}, @NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="016a9552e5a3"}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}]}, 0x74}, 0x1, 0x0, 0x0, 0x2004}, 0x4) 10:41:13 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f0000000000)={0xa, 0x6, 0x1ff, 0x3c6, 'syz1\x00', 0xffffffff}) getpeername$inet(r0, 0x0, 0x0) 10:41:13 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x1f00, 0x0}}], 0x1, 0x10000, 0x0) 10:41:13 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x4) 10:41:13 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x219}) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000000)='eth1mime_type({\x85\x00', 0x11) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r6, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000840)='./file0\x00', 0x0, 0x200, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="02000000010067a20000000002000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="04baf85e2f000a0200000000", @ANYRES32=r6, @ANYBLOB="08000400", @ANYRES32=r7, @ANYBLOB="10000000000000002000010000000000"], 0x74, 0x3) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r8, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @remote}, @IFA_BROADCAST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}}, 0x0) sendto(r2, &(0x7f0000000100)="eb59b225c7650faa1c6c3c5c86845a6807251112f6af7ec26a61d1b0008a9f4ae38b1a0dcae20397d38c441298ec1f330f163a27a73b94a8d36a3132e840719068823262", 0x44, 0x1000, &(0x7f0000000180)=@ll={0x11, 0x11, r8, 0x1, 0x8, 0x6, @broadcast}, 0x80) 10:41:14 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x101d0) 10:41:14 executing program 4: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$DRM_IOCTL_MODE_GETFB(r0, 0xc01c64ad, &(0x7f0000000000)={0x0, 0x7, 0x6, 0x20, 0xef, 0x240, 0x401}) unshare(0x40600) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 310.151221][T20432] device bridge3 entered promiscuous mode [ 310.185018][T20434] IPVS: ftp: loaded support on port[0] = 21 10:41:14 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$CAPI_INSTALLED(r1, 0x80024322) getsockname$l2tp(r1, &(0x7f0000000000), &(0x7f0000000040)=0x10) [ 310.228849][T20435] IPVS: ftp: loaded support on port[0] = 21 10:41:14 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x40000) 10:41:14 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x103000, 0x0) open_by_handle_at(r1, &(0x7f0000000100)={0xe8, 0x10001, "ede34ef2d0075386a6862f2f7a8df821cca5f15fe4a49d41f4c0ccb1c25312f8e468d82b2db494ab694b76e628d4332a451eb73fade9f4e1e5c4c6e175bc2509e9ceda5263311fa88e59fb65d72d1133dac337a5aefcba315853242d1cf1b9ca69dee8dff07429ccfb28bd8d1d9163509a4894f3acf1d3c0cd923db7c057ab3e62eaa56e8d4551e965698320d0945cc28323beef994969146b97674e0d03bc926ecbbc969799d851c4980d8d8c2a4d0e4434fd5e065d5da52119741dfc3b841a71274d8099b901440d063b68e6c5cbb309abf5805b77eb7f15d014f10c1c3b39"}, 0x20000) 10:41:14 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000080)=[r4], 0x1) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) read$midi(r1, &(0x7f0000000100)=""/85, 0x55) syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000480)=[{&(0x7f0000000200)="a35c3b761f18d0f7c32df17ffef494a21fff06ba858580291d48215c37f3013753082da82fdce96404653fcb3abd2cc879d32f5f16557665140af4c4a03ce45516615e6e8f1ac960251aa85db3c578abcc5b4e026566670bddb484d90c596c74cf869bc65c88618955a8e61935d1de8437e1e4d5294872c1ac23bf476afdeaf04e5f8ee8f2c095d8fad86ff892ab9d7fef67bbb539400c258232745902c4640a4c93921508bd8ebb9745a76da1a3b16a1baffc0890395d2d364966627a27bc25e085f4c1d5facfe02c72", 0xca, 0x80000000}, {&(0x7f0000000300)="2ba514ec6a7fb81fb18f98272c58d393bdaefe4bec2ddc7af3e973bb4396069698f02ba892", 0x25, 0x8001}, {&(0x7f0000000340)="5f7a4b0e911540de49d28a91a5904eacc51e08bce4fc74bf6b6f4bde2bfc30c42c0ffec1b6a20e1af08721d21435b319732ee23fb4b9b107bd13a2fc58927e77dcc1d6fa665a5a618bff4b5d8c43bab28311fb9ad1d7edd30a5743d73ddc516a41798585e8f052dd1b3c6b4075a295248f32deefcc32c807a6c076cce219511ca73e895f18e9c510b667176ead9bbad71a21be98bded6a2d16ef696a6b6f5e3eccbcecb895c29466ed5d4766a719fb553625a287024c3f418eff6904923b1a239df85c254ee6364feaf73f99d5c8e35b344f8a3fd15e52f116aff2a5800b63c8f1a035479b89b8b71196f7ebd216829f", 0xf0, 0x400}, {&(0x7f0000000440), 0x0, 0x8}], 0x0, &(0x7f0000000500)={[{@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@utf8='utf8'}, {@dmask={'dmask', 0x3d, 0x8001}}], [{@subj_type={'subj_type', 0x3d, 'self'}}, {@appraise='appraise'}, {@smackfsdef={'smackfsdef', 0x3d, 'cpuacct.usage_percpu_sys\x00'}}, {@fowner_gt={'fowner>', 0xee00}}, {@permit_directio='permit_directio'}]}) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 310.540585][T20485] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 310.561444][ C0] [ 310.561447][ C0] ===================================== [ 310.561450][ C0] WARNING: bad unlock balance detected! [ 310.561455][ C0] 5.6.0-rc7-syzkaller #0 Not tainted [ 310.561457][ C0] ------------------------------------- [ 310.561460][ C0] syz-executor.4/20485 is trying to release lock (rcu_callback) at: [ 310.561475][ C0] [] rcu_lock_release+0x0/0x20 [ 310.561477][ C0] but there are no more locks to release! [ 310.561480][ C0] [ 310.561480][ C0] other info that might help us debug this: [ 310.561484][ C0] 1 lock held by syz-executor.4/20485: [ 310.561486][ C0] #0: ffff888211da00d8 (&type->s_umount_key#56/1){+.+.}, at: alloc_super+0x160/0x760 [ 310.561502][ C0] [ 310.561502][ C0] stack backtrace: [ 310.561509][ C0] CPU: 0 PID: 20485 Comm: syz-executor.4 Not tainted 5.6.0-rc7-syzkaller #0 [ 310.561513][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.561515][ C0] Call Trace: [ 310.561518][ C0] [ 310.561603][ C0] dump_stack+0x1e9/0x30e [ 310.561612][ C0] ? rcu_lock_acquire+0x30/0x30 [ 310.561620][ C0] print_unlock_imbalance_bug+0x20b/0x240 [ 310.561631][ C0] ? __bitmap_andnot+0x316/0x330 [ 310.561640][ C0] lock_release+0x37c/0x720 [ 310.561648][ C0] ? rcu_lock_acquire+0x30/0x30 [ 310.561654][ C0] ? zap_class+0xd30/0xd30 [ 310.561659][ C0] rcu_core+0x7f0/0x1080 [ 310.561689][ C0] __do_softirq+0x268/0x7c5 [ 310.561698][ C0] ? irq_exit+0x223/0x230 [ 310.561706][ C0] irq_exit+0x223/0x230 [ 310.561715][ C0] smp_apic_timer_interrupt+0x113/0x280 [ 310.561722][ C0] apic_timer_interrupt+0xf/0x20 [ 310.561724][ C0] [ 310.561731][ C0] RIP: 0010:console_unlock+0xa25/0xec0 [ 310.561738][ C0] Code: 20 00 74 0c 48 c7 c7 18 d4 0a 89 e8 35 c0 52 00 48 83 3d 15 be ac 07 00 0f 84 65 04 00 00 e8 12 80 16 00 48 8b 7c 24 10 57 9d <0f> 1f 44 00 00 f6 44 24 07 01 75 52 e8 fa 7f 16 00 eb 63 0f 1f 84 [ 310.561741][ C0] RSP: 0018:ffffc9001889f8e0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 310.561747][ C0] RAX: ffffffff815e160e RBX: 0000000000000200 RCX: 0000000000040000 [ 310.561751][ C0] RDX: ffffc90011bdd000 RSI: 000000000001809b RDI: 0000000000000282 [ 310.561755][ C0] RBP: ffffc9001889f998 R08: ffffffff817a2210 R09: fffffbfff121aff9 [ 310.561759][ C0] R10: fffffbfff121aff9 R11: 0000000000000000 R12: dffffc0000000000 [ 310.561763][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff892be558 [ 310.561772][ C0] ? trace_hardirqs_on+0x30/0x70 [ 310.561776][ C0] ? console_unlock+0xa1e/0xec0 [ 310.561788][ C0] ? __down_trylock_console_sem+0x178/0x1b0 [ 310.561794][ C0] ? vprintk_emit+0x1db/0x3b0 [ 310.561799][ C0] ? vprintk_emit+0x1db/0x3b0 [ 310.561806][ C0] vprintk_emit+0x1f8/0x3b0 [ 310.561813][ C0] printk+0x62/0x83 [ 310.561822][ C0] ? __ntfs_warning+0x15e/0x190 [ 310.561829][ C0] __ntfs_warning+0x185/0x190 [ 310.561837][ C0] ? parse_options+0x39d/0x1dd0 [ 310.561847][ C0] parse_options+0xe83/0x1dd0 [ 310.561858][ C0] ntfs_fill_super+0x1e2/0x89f0 [ 310.561870][ C0] ? pointer+0x23f/0x7c0 [ 310.561884][ C0] ? snprintf+0x6f/0x90 [ 310.561891][ C0] ? set_blocksize+0x1a8/0x3b0 [ 310.561899][ C0] mount_bdev+0x232/0x340 [ 310.561905][ C0] ? ntfs_mount+0x40/0x40 [ 310.561913][ C0] legacy_get_tree+0xea/0x180 [ 310.561920][ C0] ? ntfs_rl_punch_nolock+0x17d0/0x17d0 [ 310.561926][ C0] vfs_get_tree+0x88/0x270 [ 310.561935][ C0] do_mount+0x17d5/0x2440 [ 310.561943][ C0] ? _copy_from_user+0x116/0x170 [ 310.561953][ C0] __se_sys_mount+0xd3/0x100 [ 310.561963][ C0] do_syscall_64+0xf3/0x1b0 [ 310.561972][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.561977][ C0] RIP: 0033:0x45f29a [ 310.561983][ C0] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 310.561987][ C0] RSP: 002b:00007f76d5939a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 310.561994][ C0] RAX: ffffffffffffffda RBX: 00007f76d593a6d4 RCX: 000000000045f29a [ 310.561998][ C0] RDX: 00007f76d5939ae0 RSI: 00000000200001c0 RDI: 00007f76d5939b00 [ 310.562002][ C0] RBP: 000000000076bf00 R08: 00007f76d5939b40 R09: 00007f76d5939ae0 [ 310.562006][ C0] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 310.562009][ C0] R13: 0000000000000be7 R14: 00000000004ce08e R15: 000000000076bf0c 10:41:14 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:14 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x1000000) 10:41:14 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000000)=0x80000001) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f00000002c0)) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r3, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x10c, r4, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_TWT_RESPONDER={0x4}, @NL80211_ATTR_PROBE_RESP={0xf2, 0x91, "7d8c0e6a2eaddcebb1de9be3198bd2a9d68d1a9d33ae02a53dac1ab2accbea737a05315b8e0d4f22e67e315b0778038d51bb1f5f91bf29dd72ab87949fb59183bfc7584e063ec1930eec9b94ddeb8df2b1a9c77046f9a1c596938f06bae54df3f1920550a50a9520aaf29a31342994d3e7e66235beb62e73bce956f739558ebc92c67424a8a3a0cc58cfc5306330a03e556734537412774676e2c22f5ca3654008e4f67b8014634f42bc9fdb0f2a7ba5abbbcf908817f81b686f3393a08ce0f7254d3234cb87eb56cede7535691fd1816436d0f52ad5b5d1aa7d52a37a2451224bdfc74b74cb0186183890d61e2a"}]}, 0x10c}, 0x1, 0x0, 0x0, 0x880}, 0x4000) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 310.997577][T20485] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 311.018672][T20485] ntfs: (device loop4): parse_options(): Unrecognized mount option subj_type. [ 311.030072][T20485] ntfs: (device loop4): parse_options(): Unrecognized mount option appraise. [ 311.126997][T20499] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 311.186589][T20499] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 311.233820][T20499] ntfs: (device loop4): parse_options(): Unrecognized mount option subj_type. [ 311.253318][T20499] ntfs: (device loop4): parse_options(): Unrecognized mount option appraise. 10:41:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x4000000) 10:41:16 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2000, 0x0}}], 0x1, 0x10000, 0x0) 10:41:16 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000100)={0x9, 0x1, 0x9, {0x1, 0x8}, 0x553, 0x6}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x8000, 0x4) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:16 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r1, 0xc01064c8, &(0x7f0000000080)={0x2, 0x0, &(0x7f0000000000)=[0x0, 0x0]}) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:16 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:16 executing program 3: r0 = open(&(0x7f0000000100)='./file0\x00', 0x8000, 0x1) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) r1 = open(&(0x7f0000000080)='./file0\x00', 0x3458bb5e596c838c, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x112002, 0x174) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r5, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x2, 0x0, 0x0, 0x0, r3, 0x194, 0x80}, 0x0, 0x0, 0x0, 0x81, 0x8, 0x9, 0x7ad, 0x6, 0x1, 0x7, r4, r5}) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) 10:41:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xd0010100) 10:41:17 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x9c, r1, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x78, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'geneve1\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3ff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x9c}, 0x1, 0x0, 0x0, 0x80}, 0x5000) r2 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r2, 0x0, 0x0) 10:41:17 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = accept$inet6(r1, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000440)=0x1c) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r3) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000200)={r5, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000480)={r5}, 0x8) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:17 executing program 1: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) [ 313.143758][T20551] IPVS: ftp: loaded support on port[0] = 21 10:41:17 executing program 1: unshare(0x40600) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x143680, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/sequencer\x00', 0x2380, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000002c0)={[0x1000, 0x6000, 0x4], 0x9c, 0x6e}) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000240)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, 0x140d, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x48100}, 0x240040c0) r2 = open(&(0x7f0000000080)='.\x00', 0x400000, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000000)) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000003c0)={0x0, 0xff, 0x9, r4, 0x0, &(0x7f0000000380)={0x9e0902, 0x0, [], @value64=0x9}}) ioctl$VHOST_SET_VRING_ADDR(r5, 0x4028af11, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000400)=""/60, &(0x7f0000000440)=""/229, &(0x7f0000000540)=""/127, 0xf000}) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) quotactl(0x100000000, &(0x7f0000000140)='./file0\x00', r7, &(0x7f0000000340)="3528d5c506800d6a4b816f3010e83fcbc86813fea2a555b4e68d6386a311e3a8709e89eb870a90746ba131c340c5") 10:41:17 executing program 3: socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) 10:41:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xeffdffff) [ 313.297415][T20585] QAT: Invalid ioctl 10:41:17 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2500, 0x0}}], 0x1, 0x10000, 0x0) 10:41:17 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000000)={0x7ff, 0x8002, 0x4, 0x3ff, r3}, &(0x7f0000000080)=0x10) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r5, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f00000001c0)={0x1, 'macsec0\x00', 0x2}, 0x18) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x2, 0x201, 0x7fff, 0x200, r4}, 0x10) 10:41:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xf5ffffff) [ 313.325442][T20585] QAT: Invalid ioctl [ 313.332550][T20585] QAT: Invalid ioctl [ 313.437549][T20605] IPVS: ftp: loaded support on port[0] = 21 10:41:17 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="737562766f6c69643d3078303030304730303030303030303030340a7375626a5f726f6c653d2d740e0000737465642c6d643573756d6d643573756d6c6f73656c696e75786d696d655f747970656d643573756d2a67656375726974796d696d655f74797065766d6e65743170707030706f7369785f61636c5f61636365730e030651cea3bcd39e737472757374656473656375726974796d64357375652365746830287b6340656df538f35245ba28718340a82575280b0b251b2948f2f1a748495a74891b8e211760e01aea2ead566c209250089c19842b707f41585eeae0afa38d4ef60a350963f53e9da4b1e363ec8a2d0f013fa11a3b9db6c21f3e20548a52502ef4fedafd0b6ac5941f4c366fbf741e3d7e0eb9872d825a352e98b1e3dd8b4d", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:17 executing program 1: unshare(0x40600) r0 = open(&(0x7f0000000000)='./file0\x00', 0x2a8280, 0x10) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000140)=0x67bd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, r2) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) 10:41:17 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) socket$l2tp(0x2, 0x2, 0x73) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getpeername$inet(r4, 0x0, 0x0) 10:41:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xfffffdef) 10:41:17 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000000)={0x400000000000e, 0xb, 0x1f}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x40) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x114) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="e1683bb9a74f43882935c3205f51c9c1"}, {0xa, 0x0, 0x0, @rand_addr="f2f909879815e4f0540ff0002573bbb9"}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000140), r4}}, 0x18) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x1, 0x3) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010453930000000002eb85990000", @ANYRES32=r8, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2800000014000100000000000000000002000000ec1e850402f7feecf87777033a9e84dd84bbfc0467e4a83fbbaac23f7053289047d6e0132c0a8f90cbae443022148edaa1ffe35dff20fc8ae7af317ffe9aa1055e013c63e52ce0a0a635a4d76dc8a302863e30529526c34db541c6c74758c18dd113", @ANYRES32=r8, @ANYBLOB="08000200ac1414bb08000400ac1e0001"], 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'caif0\x00'}) 10:41:17 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2900, 0x0}}], 0x1, 0x10000, 0x0) 10:41:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xffffff7f) 10:41:17 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:18 executing program 3: socket$l2tp(0x2, 0x2, 0x73) socketpair(0x2b, 0x2, 0x0, &(0x7f0000000000)) r0 = open(&(0x7f00000000c0)='.\x00', 0x182, 0x1fd) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$bt_hci(r1, 0x0, 0x1, &(0x7f0000000040)=""/79, &(0x7f00000000c0)=0x4f) [ 314.037275][T20645] device bridge4 entered promiscuous mode [ 314.039525][T20650] IPVS: ftp: loaded support on port[0] = 21 [ 314.075675][T20645] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 10:41:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xfffffff5) [ 314.116047][T20645] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 314.128255][T20661] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 10:41:18 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="cf36b69448ba65f1c29a1b5f99776f384dfc8f16e46234a876c6a08390d7f4d80468520e", 0x24, 0x9}], 0x200005, &(0x7f0000000180)={[{@user_xattr='user_xattr'}, {@hash_rupasov='hash=rupasov'}], [{@smackfshat={'smackfshat', 0x3d, '\xd0.vmnet1md5sum/\x16'}}, {@smackfsfloor={'smackfsfloor'}}, {@dont_appraise='dont_appraise'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 10:41:18 executing program 3: ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, 0x0) [ 314.237769][T20695] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash=rupasov" 10:41:18 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:18 executing program 4: unshare(0x68060400) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x4000000000000) 10:41:18 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2a03, 0x0}}], 0x1, 0x10000, 0x0) 10:41:18 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0xa4, @any, 0x2, 0x2}, 0xe) 10:41:18 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000080)={'icmp\x00'}, &(0x7f0000000100)=0x1e) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="34000000100d00"/20, @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000070c0)=ANY=[@ANYBLOB="2800000014000100000000000000000002000000", @ANYRES32=r7, @ANYBLOB="8800021eb21414bb08000400ac1e00013a2cc56a7e6aa7f5f1d5dd8d1894cf37a99328"], 0x28}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000007080)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000007040)={&(0x7f0000000180)=@newtaction={0x6eac, 0x30, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [{0x1f0, 0x1, [@m_ctinfo={0x134, 0x1c, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x6}, @TCA_CTINFO_ACT={0x18, 0x3, {0x9, 0x7fff, 0x8, 0xd41c0000, 0x100}}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x3f}]}, {0xf7, 0x6, "e9744b2db36385380d01ceb2d4f587a5867bd84a9178a0f1a6a7825779c7a0f4158898a3b6aa80c2e0b58aca8f98feb1597439f1de12db39ceade1fb441fdce204465df060a3d0d3aa0f91dd7dbab7effb3e0a29f3797f27c71ea96fa0a68f5c3836d29def7b37d812f934b79cbade094f814ceafb191ec1d9d4b2e0d0af11ad2b776f5cb28ea988afeb8ec8c7d282655b44134f2a936452d1e4f307b510ca892cdf7ea17176d27c5d61cae2082467b6f35735e2cff094f80f3e1a06484c20d068f93b2c91d3efb1bb0845f52cae3bfaf891586963a8a10718c8dd3f0837a980d623b615044a2249726c4241316644f585620a"}}}, @m_vlan={0xb8, 0x18, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x6e9}]}, {0x99, 0x6, "5395fbed4f05c26544501d0430b08133a995f2ed6050486a1ec11ce1ec3baa09983aa8b7f1cbd2755d8072d3927faa4520bec37214904fca6660c4cbcabf77c6280e3a15f19a0a80b869d0673a0e22730cc92b8de72b050e112f8b8bafff366a68960642a899486fd0ee527e91950775ebee800b0ac0a31f1b421e5a27b3a13e2f03983e798b9d1b9f740866962b23ee95fdbf605b"}}}]}, {0x310, 0x1, [@m_mpls={0x114, 0x6, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_MPLS_LABEL={0x8, 0x5, 0x68a1e}, @TCA_MPLS_LABEL={0x8, 0x5, 0xdd702}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x3, 0x80, 0x5, 0x4, 0xfa9f}, 0x2}}, @TCA_MPLS_TC={0x5, 0x6, 0x1}]}, {0xca, 0x6, "bf467facfefe445b98351d2669d013fe292b556b46d8e12763a131578d9be211ea0c2ba9ff51e9842fc1bc684e5914bd6ad41b07cb4a1170664d20c4b6260e9762066df148b1dae2c9f516529c250fff7284393fb28e772f4ff884c7f6c10e0a793f91fc91b362dfdbffc91b8f21a455881f1b96aad341352fc11620f36195daa74aa1e409df31906dcfd522cde9c42be6a2a86579337efef7874b4ec0e016f8317a995aa99efbdf1553eb0d3e6d5f07ea9c8d728e28a53de6919f4bf6ecbb8dca6ef1113bfa"}}}, @m_mirred={0x94, 0x1f, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x3f, 0x80000001, 0x6, 0x7f, 0x2}, 0x1, r7}}]}, {0x5f, 0x6, "fa4f5063349a93cc8e358cf8aebe3fea20e00e1f38c488f69c6ea10b6df94114faa3bbcdffde591c3d336cbbd4080c478e36a1c115e220ad01bbafab4eba8b1b903dc4fc60423b75c08f8883e0a3dc6f9f9993510c43499f1a754f"}}}, @m_skbmod={0xb0, 0x1f, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x98, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x24, 0x2, {{0x0, 0x0, 0x1, 0xf9a4, 0xb5c}, 0x2}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0xabf5}, @TCA_SKBMOD_DMAC={0xa}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7f}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x7, 0x1, 0x0, 0xfffff4ad, 0x66f2}, 0x7}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @random="deeea7188a9f"}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x5d15d38f, 0x10000, 0xffffffffffffffff, 0x4, 0x9}}}]}, {0x7, 0x6, "911d71"}}}, @m_tunnel_key={0xb4, 0x8, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x60, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0xfffffff8, 0x80000001, 0xffffffffffffffff, 0x0, 0xffffbec6}, 0x2}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @multicast1}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @loopback}, @TCA_TUNNEL_KEY_NO_CSUM={0x5, 0xa, 0x1}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @empty}]}, {0x3e, 0x6, "ebda05e85753fd29c1738a2de226aef860081bef08bba05b66a9db7b670f4e79b7a665f41776ea5c6dcb4bb4d845d6862375725fe03d40ca8baf"}}}]}, {0x6998, 0x1, [@m_mpls={0xf0, 0x1b, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x10000, 0x6, 0x4, 0x401, 0x10000}, 0x1}}]}, {0xbf, 0x6, "21c980f6b7e1c38d76c6719893a48b3d8e800eff09f08a86a61109a649dd4acaf989aa9326cfc5e0bef3c10257b8f345f5319ecd6dd4a280d811708cfe227726d7aeb6a802c2ba2b7346d94825ad544df5975c5ac195812a8e4247b4368994468cfbbe14807c56849fa51f90387b9120a30ade97d0b9e983299e31f59f2fcab8d19c0718395cdb79cf96bac77b9502ec2801adcc3299da4ff50ef3e64d768ef5bf3fa494382f9ed65a461a94367f46809cbca9e4513cf697d2595b"}}}, @m_pedit={0x68a4, 0xc, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x67bc, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0xc4, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}]}, @TCA_PEDIT_PARMS={0xef8, 0x2, {{{0x4, 0x7f, 0x10000000, 0x1}, 0x7f, 0x7f, [{0x3, 0x1, 0x2f7, 0x2, 0x3, 0xfff}, {0xfffffffb, 0xf398, 0x9, 0xff, 0xe1, 0x200}, {0x21, 0xa3, 0x3, 0x6, 0x99, 0x4}, {0x7, 0x1, 0x6, 0x7f, 0x4, 0x9}, {0x8, 0xffffffe0, 0x2, 0x8, 0x7, 0x6}, {0x41dd, 0x4c1000, 0x2, 0x2, 0x3, 0x5}, {0xee17, 0x7, 0x0, 0x6, 0x2, 0x66e}, {0x9, 0x1c00000, 0x1f, 0x8001, 0x89, 0x5}, {0x7f, 0x5, 0x3, 0x1, 0x10001, 0x3ff}]}, [{0x3717, 0x1, 0x4, 0x4, 0x4fb2, 0x6}, {0x0, 0x4, 0xd5, 0x8, 0x0, 0x6}, {0x2, 0xffffffff, 0x27a, 0x8, 0x101, 0x1ba0000}, {0x400, 0x8, 0x80000000, 0x893431a, 0x3, 0x898}, {0x3, 0x6, 0x9, 0x9, 0x8e, 0x9}, {0xf6, 0x401, 0xd39, 0x0, 0x7, 0x8}, {0x20, 0x9, 0xffffffff, 0x2b564ee6, 0x7fffffff, 0x6}, {0xfffffff9, 0x4, 0x6fa8, 0xd4, 0x100, 0x400}, {0x59e7, 0x10001, 0x1, 0xe1, 0x0, 0x9}, {0x0, 0x1, 0x7, 0x5, 0x1000, 0x3}, {0x5, 0x2, 0x7, 0x3, 0x9, 0x6}, {0x1, 0x3, 0x2, 0x4d4, 0xf4d2, 0x8001}, {0x0, 0x6, 0x80000000, 0x80000001, 0x6, 0x95}, {0x5, 0x6, 0x1, 0x9, 0xffffffff, 0x40}, {0x2, 0x7fffffff, 0x43, 0xfffff4d1, 0x3, 0x1}, {0xffb, 0xf9d, 0x9, 0x8, 0xfffffff7, 0x1}, {0x3f, 0x1, 0x7fffffff, 0x7, 0x101, 0x36ce4085}, {0x9, 0x0, 0xfffffffd, 0x0, 0x80000000, 0x8001}, {0x543b, 0x8, 0x0, 0x8001, 0xcfa7, 0x5}, {0x100, 0x3f, 0x5, 0x6, 0x5, 0x6}, {0x4a86, 0x2e, 0x80000000, 0xa4a8bb8, 0x10, 0x3}, {0x0, 0x6, 0x7, 0x7, 0x1, 0x5}, {0x5, 0x80000001, 0x40, 0x2, 0x7, 0xf523}, {0x5, 0x65, 0x3f, 0x800, 0x4}, {0xe72, 0x15, 0x3, 0xf90, 0xbc22, 0x89b9}, {0x1, 0x8, 0x6, 0x7, 0x80000000, 0x400}, {0x6, 0x8001, 0xfffffff8, 0x6, 0x9, 0x4a7}, {0x1, 0x7, 0x1, 0x4, 0x3, 0x6}, {0x0, 0x6, 0x53a8, 0x1, 0xffff, 0x4}, {0x6, 0x4, 0x6bfb, 0x80000001, 0x3, 0x800}, {0x7, 0x2496, 0x0, 0x2, 0x6, 0x7fffffff}, {0x8, 0x3, 0x800, 0x7fffffff, 0xaf, 0x20}, {0x80000000, 0x4, 0x200, 0x37a, 0x3, 0x4}, {0x1000, 0x56d, 0x6, 0x7, 0x3, 0x10000000}, {0x9, 0x0, 0x8, 0x5, 0x3, 0x6f82}, {0x40, 0x80000000, 0x0, 0x8, 0x1, 0x8a}, {0xffffff42, 0x3, 0x5, 0x6, 0x2, 0x3}, {0x3, 0x8001, 0x6, 0x7fff, 0x6, 0x5}, {0x8, 0xffffffff, 0x4, 0x9, 0x8, 0x1}, {0x6, 0x3, 0x1, 0x8001, 0x8, 0x5}, {0x9, 0xd7b7, 0x2, 0xe, 0x4f, 0x8}, {0x9, 0xa01, 0x1, 0x9, 0x8, 0x120000}, {0xffff0000, 0x4, 0x6, 0x1f, 0x2, 0xfffffff7}, {0x8, 0x0, 0x6, 0x6, 0x3, 0x2}, {0x3, 0xffff, 0x8, 0x10001, 0x3, 0x80}, {0xd55d, 0x6, 0xc8, 0x100, 0x5, 0x5}, {0x7fff, 0x7ff, 0x0, 0x9, 0x476, 0x3}, {0x0, 0x7ff, 0x1, 0x92, 0x8001, 0x5}, {0x1f, 0x5, 0x7, 0xffffffff, 0x2, 0x1a39}, {0xfffffffe, 0x3, 0x10000, 0x1f, 0x1, 0x10001}, {0x6, 0x8, 0x4, 0x9, 0x4, 0x10001}, {0x3, 0x2, 0x4, 0x2, 0xd7, 0x1ff}, {0x1, 0xfffffffb, 0x80000000, 0x0, 0x81, 0x74}, {0x80000001, 0x7, 0x401, 0x7f, 0x2, 0xffff}, {0x1, 0x80, 0x4, 0x5, 0x4, 0x8}, {0xffffffff, 0xfffffffc, 0xc5, 0x9, 0xfc}, {0x411, 0x3, 0x101, 0x3, 0x101, 0x7}, {0x9, 0x1, 0x6, 0x6, 0x5, 0x7}, {0xffffffff, 0x734, 0xffffffd4, 0x80, 0xea7e, 0x4}, {0x1, 0x6, 0x5, 0x241f, 0x7fff, 0x5}, {0x69a6, 0x9, 0x7, 0xfb6, 0x6, 0x8}, {0x1fd8, 0x3ff, 0x3, 0x5, 0x8, 0x1}, {0x40, 0x0, 0x8, 0x719, 0x2, 0xfffffc01}, {0x0, 0x2, 0x5, 0xffff, 0x8, 0xcd}, {0x8000, 0x5, 0x4, 0x3, 0x5, 0x1}, {0x0, 0x0, 0x2, 0x6, 0x7, 0xfffffeff}, {0x9, 0x1, 0x6, 0x10000, 0x81, 0x2}, {0xfffffc01, 0xffffff80, 0x2, 0x7, 0x3, 0x7}, {0x80, 0xff, 0xa, 0x4, 0x0, 0x20}, {0x35b35ee3, 0x1f, 0x3f, 0xffffffff, 0x1, 0x5f}, {0x1, 0x9, 0x1, 0x200, 0x6, 0x20}, {0x1, 0x9, 0x0, 0xa3, 0x81, 0xbe95ce9}, {0x1f, 0x4e, 0x3, 0x5, 0x3, 0x2}, {0x83fb, 0xd5, 0x1, 0x7fffffff, 0x0, 0x8}, {0x4, 0x0, 0xffffffff, 0x5, 0x2, 0x6}, {0x0, 0x6d, 0x6, 0x2, 0x4, 0x4}, {0x5, 0x2, 0x81, 0x38, 0x2, 0x7}, {0x10001, 0x1, 0x8, 0x3ff, 0xfffff9ca, 0x2}, {0x8000, 0x7f, 0x4, 0x7, 0x1000, 0x63978abb}, {0x8, 0x3, 0x1, 0x437, 0xb5, 0x8}, {0x1ff, 0x4, 0x0, 0xac, 0x4, 0x800}, {0x3, 0x3, 0x5, 0x3, 0x100, 0xeb}, {0x101, 0x7fff, 0x8, 0x7ff, 0x7, 0x10001}, {0x3ff, 0x4, 0x1, 0x8, 0x3, 0x909c}, {0x0, 0x4635, 0x7ec9, 0xffff, 0xfffffff7, 0x1f}, {0x7, 0x7, 0x4, 0x5, 0xce4, 0x401}, {0x200, 0x100, 0x3, 0x8, 0x9, 0x7ff}, {0x1000, 0x996, 0x0, 0x8001, 0x0, 0x5}, {0x4, 0x4, 0x7f, 0x5, 0x7ff, 0x6}, {0x2, 0xfffffffa, 0x100, 0x7, 0x6, 0x8000}, {0x7fff, 0x7e, 0x400, 0x4, 0x80000000}, {0x3f, 0x8001, 0x8, 0x8, 0x4, 0xffffffba}, {0x0, 0xad40, 0x6, 0x7, 0x5, 0x101}, {0x5, 0x7, 0x400, 0x200, 0x5a7fc5cd, 0x10000}, {0x5, 0x78, 0x2, 0x4c3, 0x4, 0x8}, {0x55ea18ff, 0x5, 0x0, 0x50, 0x3, 0x60a7}, {0x77ec, 0xfffffffe, 0x5, 0xd8, 0xfffffbcc, 0x1}, {0x80000001, 0xfffffffd, 0x5, 0x8, 0x10001, 0x81}, {0x8001, 0x755, 0x1, 0x7, 0x7fff, 0x101}, {0x3, 0x5, 0xda, 0xbce, 0x0, 0xa6}, {0x9, 0x6, 0x3ff, 0x81, 0x0, 0x80000001}, {0x20, 0x1, 0x200, 0x401, 0xfff, 0x3f}, {0x9, 0x7, 0x7, 0x5, 0x19, 0x80}, {0x559, 0x7, 0x8, 0x7f, 0xf6, 0x7ff}, {0x7, 0xff, 0xe4a, 0x1, 0xfffffff9, 0x7fffffff}, {0x9, 0x6, 0x8, 0xa99d, 0x6, 0x1f}, {0x7, 0x3, 0xfff, 0x20, 0x6, 0x4}, {0x401, 0x5, 0x40, 0x9, 0xc0, 0x1f}, {0x5, 0x7, 0xfffff45e, 0xfff, 0x1ff, 0x5}, {0x6, 0x1, 0x9, 0x7, 0x1000, 0xffff}, {0x200, 0x8000, 0x8, 0x3, 0x3, 0x1}, {0x7, 0x89d, 0x5, 0x1ff, 0x1, 0x2}, {0x5, 0x9, 0x5, 0x5, 0x8, 0x4e}, {0x8, 0x20, 0xca2, 0x800000, 0x4800000, 0x2}, {0x40, 0x6, 0x3, 0x0, 0x8bd, 0x37aeeb79}, {0x0, 0x81, 0x6, 0x4, 0x80, 0x4}, {0x5, 0x638a, 0x1, 0x5, 0x4}, {0x1, 0xffffff09, 0xb3e, 0x1, 0x5, 0x80}, {0x7, 0x3, 0x2, 0x0, 0x4, 0x6}, {0x6, 0x9, 0x800, 0x6, 0x4, 0x7}, {0x6, 0x0, 0xe490, 0x6, 0x5, 0x4}, {0x8, 0x9, 0x8, 0x0, 0x7fffffff, 0x20}, {0x100, 0xab, 0xfc7, 0x8, 0x0, 0x7ff}, {0x2, 0x10000, 0x4, 0x10001, 0x0, 0x7fff}, {0x7, 0x7, 0xd6, 0x1, 0x2, 0x9}, {0x1, 0x3, 0x10000, 0x100, 0x5, 0x9}, {0x8, 0x7, 0x0, 0x2b9, 0x7c22, 0xe9}, {0x2, 0x200, 0x3fc4, 0x7fffffff, 0x1f, 0x3}], [{0x1}, {0x3, 0x2}, {0x4}, {0x4}, {0x2}, {}, {0x0, 0x2}, {0x2}, {0x2, 0x1}, {0x5, 0x1}, {0x3}, {0x4}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x4}, {0x3, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x1}, {0x4}, {}, {0x3, 0x1}, {0x1}, {}, {0x2}, {0x4}, {0x5}, {0x2, 0x1}, {0x3, 0x1}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3}, {0x0, 0x1}, {0x1}, {0x4, 0x1}, {0x5}, {0x5, 0x1}, {0x4}, {0x5, 0x1}, {0x5, 0x1}, {0x1}, {0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {}, {0x5, 0x1}, {}, {0x4, 0x1}, {}, {0x5, 0x1}, {0x2}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2}, {0x5}, {0x5}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {}, {0x0, 0x1}, {0x2}, {}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x5}, {0x0, 0x1}, {}, {0x0, 0x1}, {0x1}, {0x4, 0x1}, {0x2}, {0x4}, {0x4}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4}, {0x4, 0x1}, {0x1}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x3, 0x1}, {0x1}, {0x1}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {0x0, 0x1}, {0x4}, {0x1, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {}, {}, {0x1, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {0x2}, {0x0, 0x1}, {0x5, 0x1}]}}, @TCA_PEDIT_PARMS={0xe80, 0x2, {{{0x3ff, 0x40, 0xffffffffffffffff, 0x3}, 0x9, 0x0, [{0x3, 0x3f, 0x7, 0x4000000, 0x6, 0x9}, {0x3, 0x7, 0x400, 0x7869, 0x76, 0x3ff}, {0x101, 0xfff, 0x80, 0x8000, 0x2, 0x7f}, {0x6, 0x4, 0x9, 0x7, 0x4, 0xffffff81}]}, [{0x0, 0x2, 0x3, 0x7ff0000, 0xcec6, 0xfff}, {0x800, 0x8001, 0xfffffffc, 0x200, 0x380, 0x6}, {0x10000, 0x7, 0x80000001, 0x1, 0x63b, 0x1}, {0x4, 0x5, 0x4bf, 0x5, 0x6, 0x3f}, {0x1ff, 0x5175, 0x9, 0x81, 0x6bc46b70, 0x9}, {0x3290, 0x7, 0x7, 0xffff, 0x5}, {0x7, 0x447e, 0x81, 0x800, 0xb3ae, 0x7fffffff}, {0x40, 0x8, 0x3411, 0x8000, 0x4, 0x40000000}, {0xa8f, 0x400, 0xcc, 0x100, 0x7, 0x2}, {0x1, 0x3, 0x6, 0x0, 0x8, 0x4}, {0x4, 0x20, 0x52a2, 0x0, 0x9, 0xff}, {0x8, 0x5, 0x0, 0x8000, 0x8001, 0x1}, {0x1d25, 0x6, 0x0, 0x0, 0x1, 0x1}, {0xff, 0xfff, 0x2, 0x4, 0x7fff, 0x8e4e7c}, {0x200, 0x1ff, 0x4, 0x376, 0x10000, 0x4}, {0x0, 0x9, 0xf209, 0x7, 0x3, 0xffffffff}, {0x8, 0x1, 0x7, 0x6, 0x7, 0x170a}, {0x6f3, 0x9, 0x401, 0x859, 0xfee, 0x7}, {0x1000, 0x7, 0x7f, 0x8000, 0x7, 0x360}, {0x3ff, 0x2, 0x9, 0x7fff, 0x4, 0x4cd}, {0x0, 0x200, 0x81, 0x3cff, 0x0, 0x2}, {0xd7, 0x81, 0x3, 0x81c, 0x2, 0xa2}, {0x5, 0x5c99, 0x5, 0x10000, 0x1, 0x4}, {0x1, 0x10000, 0x2, 0xffff, 0x9, 0xeb}, {0x1, 0x1, 0x9, 0x8001, 0x348a, 0x20}, {0x5, 0x6, 0x9, 0x2, 0x2, 0x5}, {0x8000, 0x80000000, 0x8, 0xfff, 0x3, 0x9e2}, {0x9, 0xc8a, 0x7ff, 0xffffffff, 0x5, 0x2}, {0x2, 0x3, 0x1ff, 0x6, 0x3, 0x1}, {0x5, 0x80000001, 0xb66, 0x8, 0x2fd, 0x8ea}, {0x75b, 0x6fb, 0x40, 0x3, 0x6, 0x33}, {0x4, 0x5, 0x3, 0xffff7fff, 0x545c, 0x7fff}, {0xfffffff9, 0x0, 0x1, 0x40, 0x8, 0x4e}, {0x7f, 0x0, 0x3, 0x1, 0x7, 0x5}, {0xce54, 0x0, 0x7, 0x7fffffff, 0x5, 0x4}, {0x2, 0xfba8f95, 0x4, 0x1, 0x9, 0x4}, {0x1, 0x8d62, 0x3ff, 0x100, 0x2, 0x1}, {0x10001, 0x2, 0x7ff, 0x9, 0x80000000, 0x7ff}, {0x987, 0x9d03, 0x1, 0x1, 0x8, 0x4}, {0x6, 0x9, 0x2, 0xfffffff7, 0x1, 0xfffffffc}, {0x8, 0x3, 0x6, 0x5, 0x79e3127c, 0x800}, {0x1, 0x400, 0x4, 0x7, 0x8, 0x6}, {0x2, 0x0, 0xffff1a75, 0x6, 0x80}, {0xffffffc1, 0x8, 0x7, 0x4, 0xde3c, 0x7fffffff}, {0x693, 0x5, 0x5a, 0x6, 0x4, 0x1}, {0x9, 0xffffffe1, 0x7f, 0x8, 0x7, 0x20}, {0x5c, 0x20, 0x6, 0x2, 0x9, 0x80000001}, {0x7fff, 0xff, 0x7, 0x2, 0x8}, {0x9, 0x8, 0x4da4, 0x0, 0x80, 0x3f}, {0x9, 0x4, 0x7, 0x9, 0x6, 0x7bf}, {0x7fff, 0x706, 0x1, 0x9, 0xffff5a70, 0x9}, {0x8000, 0x7, 0xfcfd12e4, 0x0, 0x8b4, 0x33e2}, {0x2, 0x0, 0x1, 0x1, 0x2}, {0x10001, 0x3, 0x9, 0x8, 0xff, 0x1ff}, {0xff, 0x3, 0x4, 0x80, 0x9e6, 0x42a355eb}, {0x80000001, 0x9, 0xfffffffc, 0x4, 0x1, 0x80}, {0x1, 0xaf, 0x8, 0x6, 0xffff, 0x10001}, {0x4b2, 0x6, 0x0, 0x7, 0xbef}, {0x5, 0x0, 0x369, 0x8, 0x1000, 0x80}, {0x4, 0x101, 0x8, 0x8b41, 0x0, 0x101}, {0x3f, 0x20, 0x4, 0x3, 0x9, 0x69}, {0x3, 0x5, 0x100, 0x6, 0xfdd, 0x20}, {0x6e, 0xffff, 0x7, 0x9, 0xcfc8, 0x1}, {0x39, 0xfff, 0x0, 0x227, 0x39e97fea, 0x6}, {0x9, 0x3, 0x7fffffff, 0xfffffff7, 0x3, 0xfec6ba6f}, {0x5, 0xdc59, 0xfff, 0x9, 0x5, 0x3f}, {0x401, 0x1f, 0x495, 0x6, 0x0, 0x9e46}, {0x4, 0x7, 0x3, 0x4, 0x401, 0x7}, {0x9, 0x2, 0x8, 0x81, 0x3, 0x9}, {0x40, 0x5, 0x2, 0x1, 0x4, 0xaa2d}, {0x25, 0x4, 0x5, 0x7ff, 0x36ff}, {0xde7e, 0x9, 0x8b, 0x8, 0xff, 0x6}, {0x0, 0x9, 0x5, 0x7, 0xff, 0x6de1}, {0x81, 0x6, 0xffff, 0x3, 0x3, 0x5}, {0x8000, 0x8000, 0xfffffffe, 0x4, 0x1, 0x5}, {0x8000, 0xffff8784, 0x200, 0x2, 0x1, 0xffffff58}, {0x3, 0x10000, 0x1, 0xb6d4, 0x101, 0x8}, {0x40400, 0x7, 0x401, 0x2215, 0x7b, 0x8}, {0x0, 0x7, 0x36d7, 0x5, 0x7, 0x9}, {0x8, 0x40, 0x0, 0x2, 0x100, 0x6}, {0xcc89, 0x3, 0x9, 0x7fff, 0x9, 0x4}, {0x2, 0x800, 0xffffffff, 0x1, 0x5, 0x7}, {0x8, 0x6, 0x2, 0x9, 0xfffffff7, 0x9}, {0x4, 0xf44, 0xfffffeff, 0x1, 0x2, 0x3}, {0xfffffff9, 0x80000000, 0x9, 0x1f, 0x80000001, 0x3}, {0x2, 0x40, 0x7fffffff, 0xd0c, 0x0, 0xb7}, {0x80, 0x7ff, 0x200, 0x8, 0x5, 0xe6}, {0x1, 0x6, 0x9, 0x12000, 0x342, 0x3ff}, {0x8, 0x0, 0x30000, 0x8, 0x8, 0x400}, {0x12a, 0x80000001, 0x429, 0xff, 0x5, 0xfffffffd}, {0xa9, 0x2, 0xfffffc01, 0x5, 0xff, 0x4}, {0x1, 0x9, 0x200, 0x7ea40000, 0x8001}, {0x101, 0x0, 0x2, 0x723, 0x400, 0x6}, {0x4, 0x9, 0x0, 0x5, 0x6, 0x10000}, {0xfffff06d, 0x7fff, 0x8, 0x5, 0x2, 0x9}, {0x5, 0x6, 0xeed, 0x200, 0xb5, 0x10001}, {0x1b6c8, 0xc4a, 0x7c5b, 0xff, 0x5, 0x5}, {0x6b0f, 0x401, 0x4, 0xdc, 0x0, 0x9}, {0xe8d, 0xc37, 0x100, 0x2, 0x1000, 0x574}, {0xfff, 0x5, 0x100, 0x0, 0x4d71, 0x7909}, {0x2, 0x7, 0xc4, 0x3, 0x80000000, 0x5}, {0x9, 0x0, 0x0, 0x2, 0x19b, 0xfffffffb}, {0x9, 0x47b, 0x1, 0x80000000, 0x4, 0xe5}, {0x7, 0x12, 0x7fffffff, 0x6, 0x1, 0x8}, {0x1, 0x7fff, 0x3, 0x5c, 0x8, 0x1}, {0x9, 0x2, 0x0, 0x2, 0x1, 0x4}, {0x0, 0x7, 0x2, 0x2, 0x3ff, 0x4539}, {0x5, 0x73e, 0xff, 0x5, 0x7, 0x1}, {0xfffffffe, 0x0, 0x2, 0x7, 0x2c, 0x1}, {0x5, 0x3, 0x0, 0x9e, 0x100, 0x6a49}, {0x7b, 0x5, 0xf2c3, 0x0, 0x1800, 0x9}, {0x1, 0x9, 0x1, 0x4, 0x8, 0x7}, {0x1, 0x20, 0x3, 0x1000, 0xfff, 0x7}, {0x10000, 0x7, 0x4bbb8c00, 0x1ff, 0x7, 0x20}, {0x81, 0x200, 0x7f, 0x8000000, 0x9, 0x7}, {0x0, 0x4, 0x8001, 0x7fffffff, 0xffff, 0x9}, {0x20, 0x5, 0x0, 0x5, 0x8, 0x7fff}, {0x342, 0x2, 0x7fffffff, 0x7f, 0x40, 0x3ed}, {0x6, 0xffff, 0x401, 0xffffffe1, 0x8, 0x2}, {0x5, 0x200, 0xffff, 0x8000, 0x4, 0x1}, {0x100, 0x7, 0x0, 0x4, 0x10000, 0x9}, {0x7, 0x3f, 0x5, 0x10000, 0x5, 0x255}, {0x10001, 0x4, 0x101, 0x80000001, 0x7f, 0x9}, {0x101, 0xe49, 0x8, 0x7}, {0x0, 0x7ff, 0x8, 0x5, 0x3, 0x2}, {0x3, 0xbb, 0x21, 0x7, 0x1, 0x20}, {0x2, 0x18, 0x0, 0xffff, 0x9, 0x6e}, {0xef5d, 0x1000, 0xfff, 0x1, 0x8001, 0x6}], [{0x3, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x1}, {0x3, 0x1}, {0x1}, {0x0, 0x1}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x1}, {0x5}, {0x5}, {0x3}, {0x1}, {0x1}, {0x3}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {0x5, 0x1}, {0x4}, {0x4, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x2}, {0x5}, {0x1}, {0x1}, {0x4}, {0x0, 0x1}, {0x1, 0x1}, {0x2}, {0x2}, {0x4}, {0x1, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {}, {0x2, 0x1}, {0x4}, {0x4, 0x1}, {}, {0x5}, {0x4, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x1}, {0x2}, {0x2}, {}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5}, {}, {0x4, 0x1}, {0x2, 0x1}, {0xa}, {0x4, 0x1}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x3}, {0x2, 0x1}, {0x1}, {0x1}, {0x2, 0x1}, {}, {}, {0x5}, {0x0, 0x1}, {0x2}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x1}, {0x2}, {0x4}, {0x4}, {0x3}, {0x3, 0x1}, {0x2}, {0x3}, {0x3}, {}, {0x3, 0x1}, {0x5}, {0x5, 0x1}, {0x5, 0x1}, {}, {0x2, 0x1}, {0x3, 0x1}, {0x1}, {0x4}, {0x4}, {0x3, 0x1}, {0x1, 0x1}, {0x3eb458e4fa4a70fd}, {}, {0x3}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x2}, {0x1}, {0x3}, {0x5, 0x1}, {0x3}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x3}, {0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x3}]}}, @TCA_PEDIT_KEYS_EX={0x12c, 0x5, 0x0, 0x1, [{0x4c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}]}, @TCA_PEDIT_PARMS_EX={0xe38, 0x4, {{{0xf7ff, 0xff, 0x6, 0x7, 0x40}, 0x7f, 0x7f, [{0x3, 0x6, 0x2, 0x8000, 0x8, 0xe252}]}, [{0x8, 0x8, 0x4, 0x3, 0x6, 0x539b}, {0x10001, 0x81, 0x2, 0x7fff, 0x0, 0x8}, {0x97a, 0x8, 0x1, 0x7f, 0x9, 0x800}, {0x200, 0x9, 0xfffffffc, 0x800, 0x800, 0x7fff}, {0x5, 0x4c97, 0x49e, 0x8, 0xaa00, 0xfffffffd}, {0x9, 0xfffffff9, 0x1df, 0x248, 0x80000000, 0xffffffff}, {0x7, 0x7fff, 0xb2, 0x9, 0x9, 0x5}, {0x5, 0x3, 0x5d5, 0x253, 0x6, 0x3}, {0x1, 0x1, 0x6, 0x4, 0x1f}, {0x85d2, 0x7, 0xff, 0xffff, 0x8001, 0x1}, {0x10001, 0x8001, 0x622, 0x152d, 0x9, 0x2}, {0x9, 0x3, 0x6, 0xa5b4, 0x5f6, 0x1}, {0xfff, 0x1000, 0x1, 0x0, 0x40, 0x7}, {0x9, 0x2, 0xb8, 0xe539, 0x1, 0x8}, {0x641, 0x0, 0xfff, 0x5, 0x3f, 0x520d41f6}, {0x0, 0xffffffff, 0x0, 0x7, 0x3, 0x753}, {0x10000, 0x1, 0x800, 0x0, 0x7fffffff, 0x6}, {0x0, 0x4, 0x0, 0xa6, 0x3, 0x8}, {0x1, 0x7fff, 0xfffffffe, 0x8, 0x4, 0x9}, {0xfffff841, 0x8, 0x5, 0x0, 0x9, 0x9}, {0x3, 0xfff, 0xff, 0xffffffff, 0x9e5, 0x8}, {0x5, 0x9, 0x0, 0x39, 0x7f, 0x153}, {0x40, 0x80000000, 0x6, 0x6, 0x7f, 0x1ff}, {0x4, 0x5, 0x0, 0x80000000, 0x5b9e, 0x6}, {0xfff, 0x2, 0x6, 0x1, 0x0, 0xffffffff}, {0x8001, 0x3, 0x800, 0x14000000, 0x0, 0x5e3}, {0xfffffffd, 0x6, 0x0, 0xd01, 0xe379, 0x5}, {0x0, 0x7ff, 0x5, 0x8, 0x3, 0x1ff}, {0x4000000, 0x1ff, 0x1ff, 0x0, 0x5, 0xfff}, {0x80, 0xffff, 0x6, 0xa2ba, 0x7ff, 0x4}, {0x1, 0xda7, 0x20, 0xbb, 0x8, 0x4}, {0x5, 0x101, 0x7, 0x7fff, 0x7, 0xe3e}, {0x400, 0x7ff, 0x6a9, 0x800, 0x11, 0x77a8}, {0x0, 0x3, 0x7, 0x0, 0x26f, 0x8}, {0x0, 0xd912, 0x2, 0x2, 0x0, 0x80000000}, {0x8, 0xf, 0x1, 0x4f, 0x7fff, 0x8}, {0x5, 0xd1, 0xfffffffc, 0x6, 0x6, 0x9c}, {0x800, 0x7, 0x100, 0xee, 0x4, 0x2}, {0x7, 0x8e, 0x6, 0x3, 0x6, 0x1}, {0x0, 0x3, 0x588a, 0x0, 0x0, 0x20}, {0x47, 0x9, 0x400, 0x1, 0x300, 0xd59c}, {0x1, 0xdb, 0x0, 0x6e43, 0x7, 0x800}, {0x6, 0x8016, 0x7fffffff, 0x9, 0x4800000, 0x79}, {0xc0000000, 0x6, 0x1580000, 0xfffffbff, 0xffff0e80, 0x1}, {0x3, 0xffffffe1, 0x9, 0x10a, 0x1, 0x1}, {0x9, 0x4, 0x13, 0x80000001, 0x2, 0xd33}, {0xfffffffc, 0xe6bc, 0x1ff, 0x40000000, 0x9, 0x3}, {0xec, 0x0, 0x6, 0x9, 0x80, 0x59f}, {0x9, 0x6, 0x6, 0x5c, 0x1, 0x7}, {0x1, 0xf98, 0x9, 0x5, 0x5, 0x2}, {0x3, 0x400, 0x4, 0x80000000, 0xffffffff, 0x3}, {0xe7e4, 0x0, 0x0, 0x4, 0x8, 0x6}, {0x8001, 0x94, 0x1, 0x3, 0x1, 0x1}, {0x1, 0x9, 0x20, 0x0, 0x6, 0x80000001}, {0x5, 0x0, 0x2, 0x1, 0x1a8, 0x1ff}, {0x0, 0x80, 0x7f00, 0x20, 0x1, 0xc}, {0x7, 0x1, 0xb8, 0xc2, 0x2, 0x800}, {0x1, 0x0, 0x9, 0x81, 0xffffff00, 0x7ff}, {0x9, 0x1000, 0xe85b, 0x10000, 0x2, 0x7}, {0x0, 0x1, 0x7, 0x84, 0x10000, 0x71e}, {0x4d3, 0x986, 0x6, 0x80000000, 0x20, 0x80000001}, {0x1, 0x7fffffff, 0xffffffff, 0x8000, 0x7f, 0x1}, {0x6, 0x80000001, 0x5dac, 0x3, 0xfffffc00, 0x3ff}, {0x4, 0x1, 0x2, 0x3, 0x4, 0x40}, {0x4, 0x40, 0x0, 0x3, 0x461c, 0x100}, {0x3f, 0x401, 0x45d1, 0x3, 0x8, 0x2}, {0xffffffff, 0x101, 0x8, 0x7, 0x2, 0x2}, {0x800, 0x0, 0x9, 0x7fffffff, 0x0, 0x100}, {0x800, 0x1, 0xbf55, 0x5, 0x7, 0xe88}, {0x7, 0x4, 0x9c7f, 0xf66b, 0x2409, 0x80000001}, {0x8000, 0xadc0, 0x10000, 0x7f, 0x0, 0x6}, {0xfffffffa, 0xea98, 0x0, 0x7, 0x80000000, 0x3}, {0x2, 0x4, 0x8, 0x700000, 0x5, 0x3c}, {0x400, 0xffffffe0, 0x4, 0x1, 0x6, 0x9}, {0xfffffffe, 0x5, 0x0, 0x200, 0x9, 0x200}, {0x2, 0x3, 0x9, 0x20, 0x9, 0x4}, {0x5, 0xffffffff, 0x1, 0x0, 0x4, 0x7ff}, {0xffff, 0x8001, 0x25, 0x400, 0x9, 0x6}, {0x4, 0x2, 0x8, 0x1, 0x6, 0x66}, {0x8, 0x2, 0x3ff, 0x1ff, 0x96, 0x282c62ef}, {0xe87a, 0x9, 0x7ff, 0x1, 0x1, 0x4}, {0x5, 0x1, 0x7, 0x6, 0x8, 0x3}, {0x7019, 0x6, 0x4, 0x7, 0x19, 0x3}, {0xff, 0xff, 0x5, 0x808000, 0x6, 0x4}, {0x40, 0x8, 0x0, 0x60, 0x4, 0x5}, {0x0, 0x80000000, 0x7, 0x4, 0x6, 0x6}, {0x3, 0x7b8c, 0x66, 0x180, 0x4, 0x6}, {0x45d806e2, 0x8, 0xfff, 0x9, 0x9, 0x4}, {0x3, 0x81, 0x5, 0xb42, 0x82b, 0x3}, {0x3, 0x3, 0xa2, 0x1, 0x20, 0xffffffff}, {0x7, 0x4, 0x1ff, 0x4, 0x4, 0xffff}, {0xcc, 0x5, 0x6, 0x3, 0x1f, 0x7fff}, {0x3, 0x8, 0x7, 0xff, 0xce6, 0x27}, {0x2, 0x4, 0x7, 0x1, 0x1, 0x5}, {0x8b9c, 0xfff, 0x8, 0xc3a5, 0x2, 0x1}, {0x10000, 0x4, 0xfac, 0x0, 0x3, 0x9}, {0x9fb8, 0x67986ab6, 0x1, 0x0, 0x80000000, 0x8000}, {0xffff0000, 0x20, 0x0, 0x7ff, 0x3, 0x5}, {0xb8, 0x9, 0x1, 0x3, 0x400}, {0x80, 0x3a, 0x0, 0x1000, 0xffff, 0x4}, {0x8, 0x0, 0x0, 0x6, 0x6, 0x3}, {0x0, 0x9, 0x6, 0x2, 0x6, 0x2}, {0x800000, 0x1, 0x7fff, 0xff, 0x5, 0x4}, {0x0, 0xcecf, 0x0, 0x38, 0x29, 0x5}, {0x3, 0x80000001, 0x0, 0x0, 0x101, 0x3}, {0x2, 0x5, 0x3, 0x4, 0x1, 0x82eb}, {0x8000, 0x5, 0x4, 0xffffffff, 0x7, 0xe50}, {0xfffffe00, 0x1734, 0x7, 0x3, 0x7, 0x1f}, {0x9, 0x4, 0x119, 0x87, 0x6, 0x7ff}, {0x3, 0x5, 0x7, 0x3, 0x6c, 0x1f}, {0x7a, 0x8, 0x3ff, 0x3f, 0x100, 0x1ce}, {0x9, 0x5, 0x7, 0x1, 0x9, 0xfffffffd}, {0x401, 0x4, 0xce, 0x10000, 0x9, 0x199f}, {0x80, 0x1, 0x8, 0x1ff, 0x9, 0x5}, {0x120, 0x5, 0x1dc, 0x9, 0x81, 0xd509}, {0x5, 0x1, 0x800, 0x80000001, 0x10001, 0x9}, {0x5, 0xee0b, 0x1ff, 0x10001, 0xffffffff, 0x4}, {0x7, 0x401, 0x0, 0x3, 0x1ff, 0x101}, {0x6, 0x51, 0x7, 0x101, 0x8001, 0x7}, {0xfff, 0x8, 0x101, 0x80, 0x8c75, 0xe}, {0xfffffffb, 0x4, 0x0, 0x3ff, 0x4, 0x7fff}, {0x5, 0x0, 0x401, 0x9, 0x6, 0x7ff}, {0x3, 0x55e, 0x8eb, 0x86, 0x0, 0x10001}, {0x5856, 0x20, 0x20, 0x80000000, 0x800}, {0xffffffaf, 0x39, 0x2, 0x0, 0x9, 0x8000}, {0xfffffffb, 0x0, 0x7, 0x4, 0xe9}, {0x7, 0x0, 0x401, 0xfffffc00, 0x7, 0xa0c}, {0x40, 0x0, 0x0, 0x3, 0x7, 0x119}], [{0x0, 0x1}, {0x5}, {0x1, 0x1}, {0x0, 0x1}, {0x5}, {}, {0x4, 0x1}, {0x3, 0x1}, {0x4}, {0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x4}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x2}, {0x5, 0x1}, {}, {0x4}, {0x4}, {0x7, 0x1}, {0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x2}, {0x1}, {0x1, 0x1}, {0x3}, {0x5, 0x1}, {0xe488976185483d47}, {0x1}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {0x0, 0x1}, {0x2}, {0x5, 0x1}, {}, {0x3}, {0x4}, {0x4, 0x1}, {0x5, 0x1}, {0x5358e29f25b1457c}, {}, {0x1, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0xe93e798f7fb39bd7}, {}, {0x5}, {0x4}, {0x4}, {0x5, 0x1}, {0x2}, {0x5}, {0x5}, {0x4, 0x1}, {0x2, 0x1}, {0x1}, {0x4, 0x1}, {0x4}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x3, 0x1}, {0x2, 0x1}, {0x3}, {0x0, 0x1}, {0x3}, {0x3, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x5}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x6, 0x1}, {0x0, 0x1}, {0x2, 0x3}, {0x5, 0x1}, {0x2, 0x1}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x2}, {0x5, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x4}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x2}, {0x4}, {0x3, 0x1}, {0x4}, {0x5}, {0x3}, {0x3}, {0x1}, {0x5}, {}, {0x0, 0x1}, {0x3}, {0x5, 0xf775895a3009bcdf}, {0x3, 0x1}, {0x5}, {0x5}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x4}]}}, @TCA_PEDIT_PARMS_EX={0xe38, 0x4, {{{0x2, 0x7, 0x0, 0x9, 0xffffffff}, 0x40, 0x20, [{0x1, 0x3, 0x2, 0x7fffffff, 0x2, 0x2}]}, [{0x6, 0xfffffffc, 0x3, 0x8001, 0x3, 0x8}, {0x2, 0xfffff3c3, 0x2, 0x7, 0x80, 0x1e}, {0x7ff80000, 0x404000, 0x1, 0x2, 0x9, 0x81}, {0xffff, 0x80, 0xffff, 0xfffffffc, 0x67}, {0x3f, 0xac, 0x0, 0x0, 0x1, 0x5ee}, {0x80000001, 0x1, 0x1, 0x3, 0x1d784128, 0xffffffe0}, {0x3, 0xffffffff, 0x4, 0x31, 0x8, 0x9}, {0x4, 0xffffffff, 0x401, 0x3, 0x7fffffff, 0x80000000}, {0x3ff, 0x245a, 0x80000000, 0x8, 0x7, 0x2}, {0x9, 0x58c1c370, 0x5, 0x3, 0x5}, {0xff, 0x4, 0x5, 0x9, 0x7fff, 0x8001}, {0x94, 0x7ff, 0x5, 0x7fffffff, 0x2, 0x3}, {0x4, 0x5, 0x80, 0x400}, {0x1, 0x0, 0x1, 0x8001, 0xdfa5}, {0x7, 0x7fff, 0x514d80, 0x9, 0x9, 0x7e7}, {0x0, 0xa664456, 0xffff, 0x8, 0x10001, 0x1f}, {0x8001, 0x401, 0x8, 0x783, 0x7, 0xaa}, {0x4, 0x3, 0x3f, 0x4}, {0x80000001, 0x100, 0x10001, 0x0, 0x7ff, 0x81}, {0x9, 0x7fffffff, 0x1000, 0x6, 0xe8d6, 0xc8e}, {0x6, 0x1, 0x3f, 0x7, 0xe7, 0x69}, {0x0, 0x1, 0x5, 0x0, 0x0, 0x80}, {0x42, 0x41, 0x101, 0x10b, 0x8001, 0x10}, {0x6, 0x4, 0x8, 0x81, 0x0, 0x8}, {0x100, 0x4, 0x6, 0x20, 0x5, 0x2}, {0x1f, 0x3, 0x1, 0x28, 0xa94, 0x7}, {0x1, 0x800, 0xffffffc1, 0x8, 0x2, 0x753}, {0x1000, 0x5, 0x34, 0x3f, 0x3, 0x1ff}, {0x4, 0x2098, 0x8, 0x4, 0x8, 0x710}, {0x0, 0x9, 0x3ff, 0x6, 0x8, 0x3}, {0x5a2, 0x1, 0xffffffff, 0x8ab, 0x131}, {0x0, 0xfff, 0x0, 0x3f, 0x10, 0x1ff}, {0x5, 0xd19, 0x2, 0x7, 0xdd6}, {0xffffffff, 0x3, 0x2, 0x8, 0x7ff, 0x3}, {0xffff, 0xf549, 0x1000, 0x0, 0x4, 0x8001}, {0x8, 0x0, 0x5, 0xfffffffb, 0xffffffff, 0x8}, {0xcf8, 0x80000001, 0x97, 0x3, 0x0, 0xffffffff}, {0x8, 0x8dc, 0x7fff, 0x143, 0x9, 0xabee}, {0xe0, 0x0, 0x3, 0x7, 0xffff0001, 0x3}, {0xf365, 0x8, 0x2, 0x7, 0xe29, 0x8}, {0x401, 0x1, 0x1, 0x82b1, 0x5c3b0dcc, 0x80000000}, {0x9, 0x8000, 0x8, 0x2, 0x80000000, 0xffffa516}, {0x9, 0x5, 0x2, 0xb5, 0x0, 0x4a}, {0x80000000, 0x0, 0x0, 0xc00, 0x1, 0x1848}, {0x10000, 0x3, 0x2, 0x80000000, 0x7, 0x1}, {0x200, 0xfb6, 0x7, 0x7, 0x2, 0x8e}, {0x8, 0x4, 0x0, 0x5, 0x800, 0x3fb1df31}, {0x4, 0xffff, 0x9, 0xffffffff, 0x8, 0x9}, {0x401, 0x200, 0x8000, 0xdf1a, 0x6, 0xfffffff8}, {0x0, 0xff, 0x163a, 0x1, 0x8, 0xdbd}, {0x4, 0x6a, 0x2, 0x3, 0xfff, 0xff}, {0xfffffffb, 0x0, 0xfffffffa, 0x3, 0x800, 0x781e17ac}, {0x8, 0x8, 0x400, 0x9, 0x3, 0x2}, {0x1, 0x6f3, 0x80000000, 0x800, 0x4, 0x5}, {0x2, 0x7, 0x1, 0x2a3, 0x1, 0x178f5b7e}, {0x7, 0x7, 0xdb43, 0xfff, 0xdd7, 0x2}, {0x1, 0x0, 0xdc, 0x6, 0x1f, 0x2}, {0x10001, 0x8, 0x8, 0x7f, 0x80000000}, {0x4, 0x7f, 0xcbc1, 0x3, 0x32, 0xffffffff}, {0x0, 0xc1, 0x7, 0x4, 0x8, 0x8}, {0x7f, 0x81, 0xce6, 0x10000, 0x3, 0x1000}, {0xe0000000, 0x40, 0x1, 0x101, 0x5, 0x5}, {0x7ff, 0x2, 0x2, 0x7, 0xffffffff, 0x14000000}, {0x7f, 0x4000, 0x24000000, 0x3f, 0x0, 0x8000}, {0x3, 0x601, 0x6, 0x1ff}, {0x10000, 0x355b, 0x20, 0x80, 0x2, 0xfffffc82}, {0x9ac, 0x7ff, 0xe2, 0x41e, 0x0, 0x535}, {0x8, 0x7, 0x200, 0x7cb3, 0x0, 0x1}, {0x5, 0x7, 0x8, 0xfffffff9, 0x6, 0x7}, {0x5a8ac012, 0x9, 0x0, 0xa9, 0x6, 0x6}, {0x8000, 0x1, 0xfffffffc, 0x7fffffff, 0x7fff, 0x7}, {0x9, 0x2, 0x7, 0x7, 0x7fffffff, 0x9}, {0x10000, 0x8, 0x70a, 0x0, 0x8, 0x7}, {0x3ff, 0x1000, 0xffffffff, 0x4, 0x1, 0x8}, {0x6, 0x7ff, 0x5, 0xfffff000, 0xfff, 0x3f}, {0x5, 0x100, 0x4, 0x80000001, 0x7, 0x1}, {0x5, 0x9, 0x2, 0x7f, 0x9, 0x4}, {0x84a, 0x6, 0x1f, 0x4, 0x9, 0x1}, {0x1, 0x3, 0x1, 0x9, 0x64, 0x6}, {0x77, 0xff, 0x100, 0xfffffffe, 0x10000, 0xff}, {0x9, 0x9, 0x0, 0x18, 0x78b, 0x8}, {0x6, 0x9, 0x2, 0x5c56, 0x20, 0x9}, {0x7, 0x80, 0x0, 0x81, 0x3}, {0xff, 0x10000, 0x20, 0x8, 0xfffffffb, 0x8}, {0x741c1b6e, 0x0, 0x9, 0x9, 0x7ff, 0x3ff}, {0x8, 0x8, 0x7, 0x1, 0x1ff, 0x40}, {0x4, 0x0, 0x400, 0xa000, 0x9, 0x8}, {0x6, 0x7fffffff, 0x100, 0x85, 0x5, 0x7128}, {0x5, 0x8000, 0x0, 0x100, 0x401, 0x80000001}, {0x2, 0x5, 0x8, 0x7fff, 0x8, 0xdc10}, {0x100, 0x1020000, 0x9, 0xbe2, 0x1, 0x4}, {0xfffffff7, 0x4, 0x1, 0x0, 0xffffffc1, 0xfe}, {0x10001, 0x8000, 0x0, 0x5, 0x0, 0x80000000}, {0x0, 0xffffffff, 0x4, 0x6, 0xbb7}, {0x400, 0x0, 0x81, 0x800, 0x7, 0x400}, {0x80000000, 0x10000, 0xb5, 0x7f, 0x228318fa, 0x3}, {0x7, 0x2, 0x40, 0x8, 0x8, 0xfffffff7}, {0x6c2c, 0x80000001, 0xa19a, 0x0, 0x5, 0x6}, {0x7ff, 0x8, 0xffffffc1, 0x4, 0xfb, 0x7}, {0x3800, 0x9, 0x9, 0x3, 0x77b, 0x200}, {0x5, 0x1, 0x8, 0x8, 0xfffffff8, 0xa}, {0x7, 0x4, 0x0, 0x4, 0x3, 0xff}, {0x3, 0x80, 0xffff, 0x57, 0xa536, 0xd}, {0x401, 0x7, 0xbdb, 0x800, 0x1, 0xffff}, {0x40, 0x6, 0x1000, 0x2, 0x6af, 0x1}, {0x4, 0x470f4162, 0xf9, 0x5, 0x800, 0x7}, {0x3, 0x86d, 0x4, 0xffffffff, 0x80000000, 0xef}, {0x2, 0x3, 0x767, 0xa3, 0x17d, 0x3}, {0xad85, 0x4, 0x8afd, 0x1, 0xfffffffb, 0xec7}, {0x101, 0x3, 0x7, 0xddf7, 0x8000, 0x400}, {0xb861, 0xffffffe1, 0xffd8, 0x65b4, 0x7fff, 0x7f}, {0x4, 0xcf6, 0xffffffff, 0xf, 0x9, 0xc4cd}, {0x8, 0x6c0, 0x0, 0x8291, 0x2400, 0x5}, {0x8000, 0x6, 0x1, 0x9, 0x225}, {0x4, 0x6, 0x101, 0x5, 0x8, 0x2}, {0x780, 0x6eb, 0x3f7, 0x3ff, 0x81, 0x81}, {0x6, 0x900, 0x8, 0x0, 0xc33a, 0x101}, {0x8, 0x0, 0x200, 0x40, 0x9, 0x6}, {0x8, 0xf126, 0x9, 0x8, 0x36, 0x5}, {0x7fff, 0x0, 0x62c6b779, 0x0, 0x0, 0x8001}, {0x8001, 0x5, 0x7, 0x2b4def82, 0xa3, 0x15}, {0x9, 0x5, 0x3, 0x7, 0xfff}, {0x0, 0x5, 0x7fff, 0x7, 0x6, 0xffffff80}, {0x3, 0xc351, 0x80000000, 0x20, 0xfe4, 0x7}, {0x800, 0x10000, 0x0, 0x7b44, 0x1000, 0x3}, {0x401, 0x9, 0x7ff, 0x8, 0x1, 0x2}, {0xc85, 0x9, 0xac, 0x7ff, 0x2, 0x80000001}, {0x8, 0x8, 0x81, 0x81, 0x4}], [{0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x3}, {0x1, 0x1}, {0x0, 0x1}, {0x5}, {0xa}, {0x2}, {0x1}, {0x1}, {0x2, 0x1}, {0x4}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x5, 0x1}, {0x2c75d62beae8aab5}, {0x5}, {0x4, 0x1}, {0x3, 0x1}, {0x4}, {0x1}, {0x5}, {0x0, 0x1}, {0x0, 0x1}, {}, {0x1}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {}, {0x4}, {0x0, 0x1}, {}, {0x5}, {0x2}, {0x1, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x4}, {0x3}, {0x5}, {0x3, 0x1}, {0x5}, {0x4}, {0x2, 0x1}, {0x5}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x2}, {0x4, 0x1}, {0x4}, {0x0, 0x1}, {0x2, 0x1}, {0x5}, {0x4, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x4}, {0x1, 0x1}, {0x1}, {0x1}, {0x5}, {0x2, 0x1}, {0x1, 0x1}, {0x4}, {0x2, 0x1}, {0x99d98be90bc72473}, {0x0, 0x1}, {0x2, 0x1}, {0x3}, {0x3}, {0x1}, {0x2}, {0x4, 0x1}, {0x4, 0x1}, {0x2}, {}, {0x1, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x4, 0x1}, {}, {}, {0x2, 0x1}, {0x1}, {0x5, 0x1}, {0x2}, {0x3, 0x1}, {0x5}, {0x0, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x3}, {0x5, 0x1}, {0x3, 0x1}, {0x5}, {0x1}, {0x4}, {0x1, 0x1}, {0x2, 0x2}, {0x7}, {0x0, 0x1}, {0x2}, {}, {}, {0x3}, {0x2}, {0x2, 0x1}, {0x4, 0x1}, {0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x3}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xeb0, 0x4, {{{0x40, 0x5, 0x1, 0x1000, 0x3f}, 0x3, 0x8a, [{0x0, 0x10001, 0xe43, 0x0, 0xfff, 0x4}, {0x7, 0x7, 0x9ab, 0x5, 0x6}, {0x7f, 0x100, 0x5, 0x2, 0x40000000}, {0x80000000, 0x401, 0xf192, 0x7ff, 0x7fffffff, 0x6}, {0x108b, 0x3, 0x7, 0x3, 0x4, 0x5}, {0x9, 0x3, 0xff, 0x91c, 0x88, 0xdd09}]}, [{0x5, 0x645160fb, 0x9, 0xfff, 0x1, 0x7ff}, {0x5, 0x3d, 0xc8a, 0x8, 0x9, 0x80000000}, {0x2, 0x4, 0x8001, 0x1f, 0xffff, 0x9}, {0x9, 0xcd, 0x52, 0x5, 0x4, 0x4}, {0x7, 0xfffff000, 0x2, 0x1, 0x7fffffff, 0x7fffffff}, {0x892, 0x7ff, 0xfff, 0x8, 0x5ead72aa}, {0x100, 0x0, 0x3f, 0x6, 0x0, 0x101}, {0x4, 0x8, 0x20, 0x3e3ccc76, 0xfff, 0x6}, {0xfffffffe, 0x1, 0x80000001, 0x9, 0x20, 0xfffffffd}, {0x5, 0x9, 0x6, 0x0, 0x29, 0x5}, {0x1, 0x85c, 0x58a, 0x4, 0x6, 0xffffffff}, {0x8000, 0xfffffff9, 0x4, 0x5, 0x8, 0x200}, {0xfffffff8, 0x1, 0x8, 0x9, 0x3}, {0x7ff, 0x1, 0x2, 0x10000000, 0x7ff, 0x1f}, {0x0, 0xd24, 0xdc8, 0xff, 0x400, 0x9}, {0x8001, 0x8, 0x2, 0x80000001, 0x0, 0x8259}, {0x1, 0x7fff, 0x7d, 0x3, 0x70e9, 0x7}, {0x5, 0x3f, 0x8, 0x2, 0xfb, 0x4f2c24ef}, {0x3, 0x6, 0x4, 0x2, 0x2, 0x400}, {0x1, 0x4b, 0xe2d, 0x4, 0xc9, 0x7}, {0x690, 0x8, 0xffffff00, 0x800, 0x9, 0x8}, {0x100, 0x6, 0x101, 0x9, 0x0, 0x200}, {0x6, 0x7fffffff, 0x3dd, 0x8, 0x3, 0x8}, {0xfffffff9, 0xb3, 0xfffffe00, 0x8a, 0x6, 0x4bb3}, {0x0, 0xff, 0x9, 0x7, 0x8, 0x9}, {0x4, 0x6, 0x5, 0x9, 0x0, 0xc1}, {0x7, 0x7f, 0xf9a4, 0x80, 0x3, 0x401}, {0x754d, 0x5000, 0xfff, 0x6, 0x6a, 0x80}, {0x7, 0x7f, 0x5, 0x1, 0x2, 0x668d}, {0x0, 0x6, 0x0, 0x818f, 0x6, 0x8}, {0x80000000, 0xfffffffe, 0x8, 0x3, 0x7, 0x2}, {0x7, 0xa3, 0x3, 0x7, 0x3, 0x2}, {0x0, 0x0, 0x7, 0x5893, 0xffffffff, 0x7}, {0x0, 0x6, 0x2, 0xd94a, 0x1, 0x6}, {0x2, 0x8, 0x2f1c, 0x100, 0x7fff, 0x7f}, {0xfff, 0x2, 0x0, 0x8f4, 0x1, 0x1}, {0x0, 0x401, 0x47, 0x2, 0x1, 0x1}, {0x0, 0x80, 0x3, 0x26, 0x0, 0x8000}, {0x401, 0xff, 0x8000, 0x1, 0x8000, 0x10000}, {0x7fffffff, 0xfffffff7, 0x20, 0x3, 0x671, 0x101}, {0x2d5, 0x84e7, 0x8001, 0x7, 0xaf47, 0x1}, {0x9, 0xeee1423, 0x2, 0x8, 0x40, 0x40000}, {0x9, 0x0, 0x7, 0x8001, 0x80000001, 0x7}, {0x9, 0x3f, 0xfff, 0x80000000, 0x9, 0x6095}, {0xc9e, 0x7bd, 0x9, 0x8000, 0xff, 0x1ff}, {0x3abb, 0x200, 0x7, 0x2, 0xfff, 0x5}, {0x5, 0x1, 0x5, 0x7, 0x8, 0x1}, {0x4, 0x5b, 0x6, 0x1, 0x1ff, 0x3a4000}, {0x6, 0x0, 0x298, 0x7, 0x3}, {0x0, 0x40, 0x33b, 0x9, 0x3, 0x3c}, {0x0, 0x3, 0xfffffff7, 0x6, 0x5a, 0x6}, {0x100, 0xffffffff, 0x1, 0x1, 0x6, 0x8}, {0xf999, 0x7, 0x4, 0x9, 0x0, 0x77f}, {0x8, 0x69f9, 0x7, 0x47f9bf12, 0x8, 0x8}, {0x8, 0xfff, 0xffffff6c, 0x2, 0x5, 0x5}, {0x8, 0x7fffffff, 0x1000, 0x5, 0x3, 0x8000}, {0x401, 0x400, 0x5, 0x80000000, 0x8, 0x3}, {0x71, 0x200, 0x7f, 0x80000000, 0xfff}, {0x63c, 0xffff, 0x0, 0x5b4d, 0x5, 0x3}, {0x5, 0x6, 0x7f, 0x8, 0x22, 0x1}, {0x0, 0x1, 0x8, 0x83, 0x5, 0x9}, {0x0, 0x3835, 0x6, 0x5, 0x706, 0x5}, {0x9, 0x40, 0x9, 0x7ff, 0x6, 0x8001}, {0x1, 0x5, 0x10001, 0xe12e, 0xf32, 0xfff}, {0x200, 0x5, 0x2, 0x53, 0x4, 0xcb1c}, {0x0, 0x800, 0x8, 0x6, 0x40}, {0x6, 0x10001, 0x7, 0x49c, 0xbf, 0x3ff}, {0x0, 0x3582, 0xffffffff, 0x3, 0x7, 0x3}, {0x5, 0x0, 0xfffffe01, 0x0, 0x3ff, 0x81}, {0x200, 0x80000000, 0x1, 0x6, 0x1, 0x1}, {0x7, 0x10001, 0xec, 0x5, 0x61, 0x8e}, {0x4, 0x0, 0x1, 0x4, 0xfffffff9, 0x7fff}, {0x5, 0x6, 0x2, 0x0, 0x1, 0x8}, {0x7, 0x9, 0x9, 0x2, 0x87, 0x7}, {0x3, 0x101, 0x20, 0x8, 0xc9, 0x2}, {0x4, 0xffffffff, 0x7, 0x5b1f, 0x1, 0x100}, {0x100, 0x9, 0xa1, 0x7, 0x1, 0xfff}, {0x3, 0x4, 0x8, 0x1, 0x4, 0x47}, {0xffff, 0xc2c, 0x5, 0x0, 0x2, 0x6e}, {0x3f, 0x3, 0x3ff, 0x6, 0x65b, 0x8}, {0x9508, 0x6, 0xffff8000, 0x6f1, 0x9e, 0x62}, {0xfffffff8, 0x1, 0x2, 0x3, 0xf5, 0x401}, {0x7, 0x7a, 0xff, 0xfffffff9, 0x10000, 0x6}, {0x0, 0x1, 0x3107a000, 0xffffffe1, 0x8, 0xc3e4}, {0x9a, 0x6, 0x80000000, 0x10000, 0x0, 0x5}, {0x0, 0x0, 0x9, 0x6, 0x1000, 0x8}, {0x2ac, 0x800, 0x0, 0x200, 0x1, 0x3}, {0x7, 0xfb, 0xffffffff, 0x6, 0x400, 0x6}, {0x20, 0x9, 0x4, 0x8, 0x3, 0x5}, {0x0, 0x6, 0x1f, 0x3, 0x0, 0xdf}, {0x76, 0xfffff800, 0x6, 0x8, 0x5, 0x2}, {0x0, 0x6, 0x8001, 0x1, 0x10000, 0x4}, {0x8, 0x10001, 0x8001, 0xbc6c, 0x2, 0x9a}, {0x6, 0x620, 0x0, 0x0, 0xfffffffc, 0x8}, {0x6, 0xe6, 0x9, 0x6, 0x829, 0x6}, {0x1, 0x1f, 0xf6d, 0x8, 0xeba, 0x77eb5371}, {0x6f, 0x7ff, 0x7ff, 0xfff, 0x6, 0x7}, {0x8, 0x5, 0x7f, 0x7f, 0xfffffffd, 0x3}, {0x81, 0xfffffff8, 0xffff, 0x7f, 0x4, 0x9}, {0x4, 0xfffffff7, 0x858, 0x4, 0x850000, 0x7}, {0x6, 0x4, 0x9, 0x7f, 0x20, 0x5}, {0x8, 0x6, 0x3ff, 0x2, 0xfffffff8, 0x2}, {0x8, 0x5, 0x3, 0x6, 0x3, 0x7}, {0x33c, 0x0, 0xfffffffc, 0x2, 0x3, 0x7}, {0x37f, 0x6, 0xffff, 0x3ff, 0x7730, 0xbdf}, {0x2, 0x7, 0x400, 0x9, 0x1, 0x8001}, {0x2, 0x8, 0x0, 0x2, 0x81, 0x5}, {0xffff, 0x2, 0x7f, 0x3eb8f6a6, 0x7fffffff, 0x8}, {0x2, 0x1, 0x6, 0xffff, 0x100, 0xffffff7f}, {0x9, 0x7, 0x0, 0x7, 0x2}, {0x0, 0xcd20, 0x0, 0x1, 0xfffffc00, 0x1}, {0x5, 0x2, 0x1, 0x4, 0x0, 0x80000001}, {0x20, 0xa9, 0x1, 0x8000, 0x40, 0x9}, {0x80000000, 0x5, 0x5, 0x7, 0xa1e, 0x10001}, {0xff, 0x4, 0x4, 0x8ef8, 0x9, 0x3}, {0x5, 0x7dcd, 0x2, 0xca0, 0x6}, {0x5, 0x755, 0x6, 0x67, 0x7faebfdb, 0x137b}, {0x8, 0x4, 0x401, 0x7ff, 0x93, 0x3}, {0x3, 0x1, 0x3, 0x401, 0x8, 0x3ec}, {0x8, 0x0, 0x0, 0x1, 0x3, 0xfffffff7}, {0x7, 0xbb, 0x5, 0x1f, 0x200, 0x7fffffff}, {0x4, 0x9, 0x0, 0xcd1, 0x8, 0x7fffffff}, {0x1, 0x3, 0x2, 0x10000, 0x81, 0x9}, {0x3a, 0x0, 0x7ff, 0xffffffff, 0xfffffff7, 0x12e800}, {0x8, 0x7, 0xffffffff, 0x9, 0x8001, 0x80}, {0x1, 0x8000, 0x400, 0x8, 0x0, 0x7}, {0x8001, 0xed18, 0x3, 0x1ff, 0x2928, 0x88}, {0xd, 0x2, 0xfffffff7, 0x35e79a1b, 0x80000001, 0x7}], [{0x2, 0x1}, {0x5, 0x1}, {0x4}, {0x4, 0x1}, {0x0, 0x1}, {0x2}, {0x2}, {0x4, 0x1}, {0x2, 0xcda8d88bf2149cf8}, {0x1}, {0x5}, {}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x2}, {0x4, 0x1}, {}, {0x6}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x5}, {0x5, 0x1}, {0x4, 0x1}, {0x2}, {0x1}, {0x7}, {0x2}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {}, {0x5, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x5}, {0x4}, {0x1, 0x1}, {0x5, 0x1}, {0x1, 0x33b53b6b21a22ce0}, {0x1, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x1}, {0x3, 0x1}, {0x3, 0x1}, {}, {}, {0x0, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x1, 0x85bc5fb1780ff6f3}, {0x1}, {0x4}, {0x3, 0x1}, {0x4, 0x1}, {}, {0x5, 0x1}, {0x1, 0x1}, {0x3}, {}, {0x4}, {0x3}, {0x4}, {0x2}, {}, {0x0, 0x1}, {}, {0x5}, {}, {0x2}, {0x1, 0x1}, {0x3, 0x1}, {0x1}, {0x4, 0x1}, {0x1}, {0x3}, {0x2}, {0x2}, {0x5}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x5}, {0x1, 0x1}, {0x0, 0x1}, {0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x2}, {0x2, 0x1}, {0x0, 0x1}, {0x5}, {0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x2, 0x1}, {0x4}, {0x2}, {0x2, 0x1}, {0x5, 0x1}, {0x2}, {0x5, 0x1}, {0xaa6a8a4f5f4c429a}, {0x2}, {}, {0x7, 0x1}, {0x1}, {0x2}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x1}, {0x1, 0x1}, {0x4}]}}, @TCA_PEDIT_PARMS={0xec8, 0x2, {{{0x3ff, 0x6, 0xffffffffffffffff, 0x200, 0x1000}, 0x2, 0xd8, [{0xe47a, 0x0, 0x3, 0xffff, 0x1ff, 0xfffffffa}, {0x8, 0x3f, 0x7, 0x7fff, 0x9, 0x8}, {0x6, 0x1000, 0x73c7, 0x40, 0x8, 0x2}, {0x3ff, 0x7f, 0xffffffff, 0x800, 0x113d, 0x12000000}, {0xfff, 0x1, 0x2, 0xffffffff, 0x1000}, {0xa42f, 0xff1, 0x7, 0x5, 0xffffddc1, 0xba5}, {0x1, 0x7, 0xde, 0xc52, 0xffff, 0x39}]}, [{0x5, 0x3, 0xffffffff, 0x80000000, 0x6, 0x6}, {0x0, 0x1, 0x5, 0x58000000, 0x1, 0x8}, {0xdd, 0x401, 0x81, 0x6, 0x0, 0x2}, {0x8, 0x0, 0x2426, 0x5, 0x4, 0x1ff}, {0x85, 0xffffffff, 0x0, 0x40, 0x200, 0x1}, {0x3, 0x73da, 0xffffff80, 0x2a, 0x0, 0x8}, {0x8, 0x4, 0x4, 0xe3b8, 0x1000, 0xe4b}, {0x3e2, 0x3, 0xffffffff, 0x81, 0x5, 0x6}, {0x3, 0x4, 0x9, 0x7, 0xcda, 0x9}, {0x7, 0x101, 0x8, 0x50d7, 0x9, 0x5}, {0x2, 0x3, 0xfffffeff, 0x0, 0x9, 0x5}, {0x100, 0x3, 0x7, 0x101, 0x40, 0x6}, {0x8000, 0x1, 0x9, 0xffff, 0x1, 0x80000001}, {0x9, 0x40, 0x0, 0x100, 0x401, 0x8000}, {0x1, 0x9, 0x81, 0x7, 0x7fff, 0x2400}, {0x2, 0x2, 0x0, 0xffffffc8, 0x6, 0x40}, {0x100, 0x1000, 0x42a, 0x0, 0x3ff, 0x80000000}, {0x7, 0x200, 0x8a, 0xffffffd8, 0x7ff}, {0x4, 0x57, 0x9f884a2, 0x3, 0x5b, 0x470}, {0x0, 0x7ff, 0x2, 0x7, 0x8e, 0x80000001}, {0x3ff, 0x9, 0x8, 0x6, 0x90b}, {0x3, 0x6a8, 0x8001, 0x80, 0x9, 0x1}, {0xffffff00, 0x9, 0x5, 0xffff, 0x0, 0x2}, {0x9, 0x1, 0x6, 0x3, 0x400, 0x9}, {0xeaf5, 0x6, 0x101, 0x1ff, 0xffffffe1}, {0x3f, 0x1, 0x0, 0x1, 0x1, 0x401}, {0x678, 0x7ff, 0x7, 0x6, 0x9, 0x5}, {0x1, 0x9, 0x5, 0x0, 0x40, 0x6}, {0x60000000, 0x8001, 0x8, 0x6aa861b3, 0x7, 0x9}, {0x6, 0x9, 0x7, 0x1, 0xffffffff, 0x7}, {0x200, 0x0, 0x5, 0x0, 0xa98, 0x9}, {0x3, 0x10001, 0x6, 0x0, 0x3, 0x5}, {0x2, 0x1, 0x4, 0x10000, 0x8, 0x3}, {0x8, 0x4c, 0x4, 0x2, 0x3, 0x7}, {0x5, 0x3, 0x8, 0x0, 0x4ee4, 0x40}, {0x0, 0x7ff, 0x80000000, 0xffff, 0x0, 0x415}, {0x8, 0x9, 0x7fffffff, 0x1f, 0x6, 0xfffffff8}, {0x8, 0x3, 0x3, 0x80d5, 0x7, 0x7}, {0x61, 0x9, 0x2, 0x2, 0xb, 0x1000}, {0x80b, 0x3, 0x5, 0x100, 0x12, 0x8}, {0x20, 0xaebc, 0x7fff, 0x7f, 0x8, 0x8}, {0x7, 0x27, 0xf6, 0x0, 0xfcf, 0x9}, {0x5, 0xa8d, 0x0, 0x8, 0x1, 0x1}, {0x8000, 0x9, 0x8, 0x7ff, 0x3, 0xfffffffb}, {0x80000000, 0x8, 0x1ff, 0x1, 0x6}, {0x4, 0xff, 0x0, 0x1000, 0xffff, 0xb9}, {0x80000001, 0x5, 0x80000001, 0xff, 0x0, 0x1}, {0x6, 0x1, 0x4, 0x4, 0x1ff}, {0x81, 0x9, 0x10001, 0x9, 0x3, 0x1000}, {0xfff, 0x2, 0x2, 0x33f4, 0x7, 0x7}, {0x80, 0x9, 0x80, 0x88, 0x1, 0xffffff51}, {0x94dd, 0x67c, 0x6, 0x2, 0x0, 0x4d2}, {0x5, 0x80, 0x401, 0x7fffffff, 0x0, 0x5}, {0x8d44, 0xfffff000, 0x9, 0x1ff, 0x7b14, 0x4}, {0x8, 0x100, 0x0, 0xffffffff, 0x7, 0x46a8}, {0x9, 0x7, 0xffffff80, 0xfffffff8, 0x8, 0x400}, {0x2, 0x3, 0x2, 0x1, 0x3130}, {0x1, 0x8, 0x1, 0xa78d, 0xffff98ee, 0x5}, {0x7f, 0xe07e, 0x7, 0x5, 0x40, 0x1}, {0xd30, 0x1, 0x0, 0x4, 0xffffffff, 0x4}, {0x80, 0x9, 0x808, 0x1, 0xffdc, 0x1}, {0x5, 0x50c6, 0x10, 0x0, 0x1ff, 0x9}, {0x5, 0x3, 0x5, 0x6c, 0x1, 0x26e4}, {0x3ff, 0x8, 0x6, 0x9, 0x0, 0xac}, {0x3, 0x6acd, 0xff, 0x400, 0x101, 0x3}, {0x208, 0x2, 0xfffffff7, 0x6, 0x3e, 0x2d}, {0xff, 0x40, 0x80000001, 0x80, 0x2, 0x5}, {0x9, 0x3, 0x3, 0xfff, 0x3, 0x4}, {0x3, 0x5, 0x0, 0x8, 0x2}, {0xffff, 0x6, 0x1ff, 0x3, 0x3, 0x6}, {0x401, 0x2, 0x7, 0x2ae8, 0x4, 0x401}, {0x5, 0x4, 0xffffffff, 0x4, 0xf1, 0xfb2}, {0x75a, 0xc5e8, 0xf7dd, 0x2, 0x7, 0xfffffff7}, {0x4, 0x80000001, 0xe9, 0x7, 0x8001, 0x1}, {0x3ff, 0x2, 0x20, 0xf1, 0x4, 0x74}, {0x0, 0x9, 0x8000, 0x6, 0x1, 0xfff}, {0x7, 0x7fffffff, 0xb140, 0x0, 0x8c54, 0xa81}, {0x800, 0x669, 0x20000, 0xfffffffb, 0x0, 0x20}, {0x8000, 0x5, 0x291, 0x1, 0x9b, 0x9}, {0xc1a, 0xfd, 0x2, 0x3ff, 0x1, 0x1}, {0x2, 0x80000000, 0x4e7, 0x9e, 0x3, 0x6}, {0x925, 0x0, 0x884, 0xffffffc1, 0x311}, {0x5, 0x4, 0x3, 0x5, 0x1, 0x2}, {0x9, 0xffffffae, 0x8001, 0x92, 0x74, 0x7f}, {0xff, 0x7, 0x7, 0x10001, 0x40, 0xffff}, {0x10001, 0x3, 0x8, 0x12a0, 0x6, 0x8}, {0x63f1, 0x1, 0x2, 0x8, 0x9, 0x8}, {0x2b69, 0x5, 0x0, 0x10000, 0x0, 0x22}, {0xfff, 0x3, 0x3, 0xbbc, 0x8, 0x2}, {0x3, 0x5, 0x3f, 0x10000, 0x7, 0x8001}, {0xfffffffa, 0x1, 0x3, 0xa0b5, 0xe638, 0x7}, {0x0, 0x3, 0x20, 0x22ec, 0x5, 0x2}, {0x1ff, 0x4, 0x100, 0x4, 0x477, 0x4}, {0x80000, 0x8, 0xffffffff, 0x9, 0x8000, 0xf5}, {0x4c0, 0x20, 0xffff, 0x80, 0x8, 0x7fff}, {0x7, 0x1ff, 0x8, 0x1000, 0x5, 0xfffffc01}, {0xffff, 0x0, 0x5, 0x8, 0xa49, 0x6}, {0x8, 0x9, 0x7555, 0x2, 0x8, 0x401}, {0x59, 0x3d79, 0x5, 0x3, 0x5, 0x1}, {0xe3, 0x0, 0x7f, 0x5, 0xe47, 0x6}, {0x40, 0x3, 0x401, 0x7, 0xffffffff, 0x3}, {0x400, 0x0, 0x1, 0x1, 0xad0, 0x1}, {0x1000, 0x10001, 0x5, 0x1, 0x1, 0x9e9}, {0x80000000, 0xfff, 0x1, 0x7, 0x10001, 0xd2}, {0x2, 0x3f, 0x17fa, 0x4, 0x1, 0xfffffff9}, {0x9, 0x3, 0x2780, 0x4, 0xfffffff7, 0x8}, {0x0, 0xffffffff, 0x6, 0x0, 0x6, 0x5}, {0x73c, 0x0, 0xe2b2, 0x9, 0x1, 0x4}, {0xfffffffc, 0xfffff5f2, 0xf9c, 0x0, 0x9, 0x80000000}, {0x4deb, 0xfffffff7, 0x1, 0x2, 0x8, 0x780}, {0x2, 0x7fffffff, 0x5, 0xfffffffc, 0x9, 0x6}, {0x3f, 0x9, 0x5, 0x9, 0xce, 0x9c0}, {0x8, 0x1, 0x330dd088, 0x800, 0x6, 0x1}, {0x295, 0x8, 0xb417, 0x6, 0xc8e3}, {0x4, 0x40, 0x1, 0x2, 0x7fff, 0x3}, {0x6, 0x4, 0x7f, 0xfff, 0x6, 0xaf9}, {0x9, 0x7fffffff, 0x3, 0x7be3, 0xae}, {0xc2, 0x5, 0x10000, 0x7fff, 0x80000000, 0x3}, {0x200, 0xb5b0, 0x0, 0x8, 0x5, 0x9}, {0x51, 0x6, 0x81, 0x1f, 0x20, 0x7}, {0x9, 0x1, 0xffffffff, 0x10001, 0x4, 0x6}, {0x6, 0x6, 0x20, 0x401, 0x1, 0x5}, {0xfffffff8, 0x0, 0x0, 0x5, 0xffffffff, 0x2}, {0x9, 0x2, 0x200, 0x0, 0x4afe, 0x20}, {0x0, 0x9, 0x5, 0x2, 0x9, 0x2}, {0x1, 0x7fffffff, 0x4, 0xff, 0x5, 0x5}, {0x0, 0x5, 0x4c0, 0x7, 0x8, 0xf4e8}, {0x9b, 0x4a1, 0x6, 0x1, 0x3, 0xffffffff}], [{0x5}, {0x0, 0x1}, {0x5}, {0x5}, {0x3, 0x1}, {0x5}, {0x3, 0x1}, {}, {0x3, 0x1}, {0x5, 0x1}, {0x5}, {0x4}, {0x1, 0x1}, {0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x2}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x1}, {}, {0x5, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x5}, {0x5}, {0x5, 0x1}, {0x0, 0x1}, {}, {}, {0x4, 0x1}, {0x3, 0x1}, {0x2}, {0x0, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x4}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x2, 0x1}, {0x2, 0x1}, {0x4}, {0x2}, {0x2}, {0x1, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x6, 0x1}, {0x2, 0x1}, {0x3}, {0x4}, {0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x5}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x2, 0x1}, {0x1}, {}, {0x0, 0x2}, {0x0, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x6}, {0x4}, {0x4, 0x1}, {0x5}, {0x5, 0x1}, {0x3, 0x1}, {0x5}, {0x6, 0x1}, {0x5}, {0x0, 0x1}, {0x5}, {0x3}, {0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x4}, {0x2, 0x9f69f79e515965a9}, {0x0, 0x1}, {0x3, 0x1}, {}, {}, {0x5, 0x1}, {0x2, 0x1}, {0x4}, {0x5}, {0x4}, {0x4, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x3}, {0x4, 0x2}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x1}, {0x4, 0x1}], 0x1}}, @TCA_PEDIT_PARMS={0xe68, 0x2, {{{0x10000, 0x0, 0x7, 0x1, 0x81}, 0x40, 0x1, [{0x2, 0xfffffff7, 0x6, 0x7, 0x6, 0xfffffe01}, {0x0, 0x2, 0xc2, 0xb19c, 0xff, 0xfff}, {0x185d, 0x60, 0x2, 0x8, 0x80, 0x4}]}, [{0x8, 0xfffffffe, 0x1, 0x1, 0x8}, {0x10001, 0x1000, 0x10001, 0x3, 0x9, 0x2}, {0x8, 0x4, 0x2ddf, 0x1, 0x2, 0x1}, {0xb6, 0x3ff80000, 0x6, 0x0, 0x2, 0x10000}, {0x90000000, 0x63b1, 0x6, 0xfff, 0x80000001, 0xfff}, {0x9, 0x8000, 0x2, 0xfffffffd, 0x7c2c, 0x8}, {0x9027, 0x1, 0x12000000, 0xfffffff7, 0x3, 0x1f}, {0x7fffffff, 0x8f, 0x7, 0x4, 0x3, 0xc185}, {0x3, 0x80000000, 0xfff, 0x3, 0x13, 0x1}, {0x80000001, 0x4, 0x2, 0x80, 0x5, 0x1f}, {0x6, 0x2, 0x4, 0x10001, 0x3}, {0x0, 0xfffff801, 0x1, 0x80000000, 0x8, 0x5}, {0x7f, 0x9, 0x1, 0x1, 0x0, 0x7fffffff}, {0x5c9, 0x2, 0x10000, 0x3, 0x9, 0x4}, {0x7, 0x2, 0x7, 0x4, 0x7, 0x5}, {0x800, 0x9, 0x18000000, 0x9, 0x5, 0x5}, {0x0, 0x9, 0x1, 0x10000, 0x9, 0x669}, {0x86, 0x3, 0x0, 0x5, 0x90000, 0xffffffff}, {0x0, 0x7, 0x10001, 0x2, 0x5, 0x2}, {0xf384, 0x80000000, 0x6, 0x200, 0x25da, 0x7}, {0x1, 0x6, 0x7f, 0x3, 0xb1, 0xa2}, {0x10001, 0x8000, 0x7, 0x23e, 0x3c3}, {0xff, 0x80000000, 0x40, 0x4, 0x7fff, 0xc65}, {0x9, 0x7fff, 0x4, 0x8001, 0xfc, 0x9}, {0x323, 0x9, 0x3f, 0xd57c, 0x1ac, 0x3}, {0x4, 0xc3, 0x1, 0xace, 0x7ff}, {0x1, 0x7, 0x4133, 0x8001, 0x1, 0x9}, {0x1, 0x6, 0x9, 0x6b, 0x9, 0x3f}, {0x3, 0x891, 0x5, 0x2, 0x64f, 0x5}, {0x3, 0x8, 0x1, 0xffffffff, 0x0, 0x101}, {0x0, 0x0, 0x1, 0x0, 0x9, 0x5}, {0x7f, 0x2, 0x8, 0x101, 0x401, 0x80000001}, {0xac01, 0x3, 0x3, 0xffff8e47, 0x427, 0xfffffffc}, {0xff, 0x607, 0x1, 0x80, 0x3, 0x3}, {0x80000000, 0x200, 0xffffac7c, 0xffffff1d, 0x1fa, 0x7}, {0x3, 0x5, 0xf8000000, 0x6, 0x80000000, 0xffffffff}, {0x3, 0x0, 0x1ff, 0x1, 0x2, 0x5}, {0x800, 0x6, 0x20, 0xb984, 0xb21, 0x7ff}, {0x10001, 0x0, 0xd3a9, 0x34f1e39e, 0xffffffff, 0x9}, {0x0, 0x91, 0x3f, 0xbc, 0x0, 0x1d9}, {0x7, 0x8, 0x7e8, 0x3, 0xffff9333, 0x5}, {0x1ff, 0x10001, 0x0, 0x4, 0x401, 0x4}, {0x400, 0xfffffffe, 0x624, 0x80000001, 0x2, 0x4}, {0x6, 0x101, 0x3f, 0x6, 0x405, 0x80}, {0x7, 0x4, 0x9, 0x0, 0x2, 0x8}, {0x8000, 0x7ff, 0x655, 0x2, 0x1, 0x400}, {0xfffffffc, 0x8, 0xf125, 0x6, 0xffe, 0xfffffffb}, {0x3, 0x1, 0x3, 0x1, 0x1, 0x4}, {0x0, 0x7, 0x3ff, 0x8fce, 0x7, 0x4260}, {0xfffff801, 0x6, 0x1ff, 0x1, 0x400000, 0x1}, {0x80, 0x7ff, 0x7, 0x7e39, 0x7fffffff, 0xc7}, {0x3, 0x8, 0x7f, 0x6, 0x0, 0x1}, {0x0, 0x7, 0xe637, 0x8, 0x0, 0xe2}, {0xa726, 0x3, 0x2, 0x4, 0x9, 0x1ff}, {0x0, 0x0, 0x6, 0x7, 0x7a1, 0x3f}, {0x5, 0x19b88a9a, 0x8, 0x7a, 0x9, 0x1}, {0x4, 0xfffffffd, 0x5, 0x2, 0x20, 0x4182}, {0xe83, 0x0, 0x51600, 0x5, 0x9, 0x3}, {0x43586b2d, 0x5, 0x6, 0x2df6, 0x2, 0x9}, {0x533, 0xfffffffc, 0x7fffffff, 0x800, 0xe8, 0xfff}, {0x80, 0x0, 0x1, 0x8, 0x7, 0x8}, {0x5, 0x8, 0xff, 0x3, 0xe8, 0xa40}, {0x2d, 0x7fff, 0x8, 0x6, 0xffffffff, 0x80000000}, {0x80, 0x8, 0x4, 0x8001, 0x0, 0x7c59}, {0x4, 0xa000, 0x7ff, 0xffffff80, 0xd4dd, 0x2f}, {0x8, 0x6, 0x7, 0x8, 0x9ef3, 0x1}, {0x5e1, 0x3, 0x10000, 0x8f, 0x0, 0x8}, {0x6, 0x0, 0x100, 0xe2d8, 0x5, 0x400}, {0x6e8, 0xffff, 0x5, 0xd16b, 0xfffffffd, 0x6}, {0x1000, 0x3f7f, 0x30, 0x7, 0x2, 0x5}, {0x7fff, 0x2, 0x80, 0x4, 0x81, 0xea38}, {0x3b8, 0x9, 0x40, 0x4, 0x100, 0x7f}, {0x9, 0x5, 0x2400000, 0x7, 0x0, 0x6}, {0x5, 0x8077, 0x8, 0x6, 0xfffff48e, 0x70a}, {0x328, 0x12000000, 0x9e, 0x401, 0x5, 0x77}, {0xcdd5, 0xefc, 0x9, 0x7fff, 0x10001, 0xcf29}, {0x0, 0x0, 0x8, 0x6, 0x3ff, 0x4}, {0x4, 0x4, 0xffff, 0x0, 0x3, 0x5}, {0x1, 0x9, 0x1, 0x6, 0x5, 0xfffffff7}, {0xfffffff7, 0x3, 0x3f, 0x3, 0x2d9, 0xffff}, {0x8, 0x9, 0x7, 0x8, 0x7fffffff, 0x401}, {0x8000, 0x68d, 0x2800000, 0x1000, 0x9, 0x3}, {0xa2, 0xe49, 0x1a9b, 0x6, 0x3f, 0xffffffff}, {0x1, 0x3, 0x9, 0x3, 0x76a1}, {0x9b1, 0x4, 0x7, 0x7f, 0x3, 0x3ff}, {0x3, 0x7fffffff, 0x6, 0x200, 0x5, 0x3ff}, {0x5, 0xfffffc00, 0x1, 0xfffffffe, 0x9, 0x3f}, {0x2, 0x5, 0x7a, 0x1, 0x80, 0x1}, {0x4, 0x101, 0x1f, 0x9583, 0x3, 0x3ff}, {0x0, 0x6, 0x4, 0x7ee0, 0x3, 0x7fffffff}, {0x5, 0x6a, 0x0, 0x9, 0x200}, {0x8, 0x6, 0x5, 0x8, 0x9, 0x3}, {0x8000, 0xa68f, 0x7, 0x7, 0x0, 0x8}, {0x1, 0x0, 0x339, 0x2, 0x3, 0x4}, {0x1000, 0x7fff, 0x2, 0x7, 0x80000000, 0x4}, {0xffffffff, 0x8000, 0x80, 0x3, 0x4ee3, 0x7}, {0x9, 0x9, 0x40, 0x81, 0x3, 0xb0d}, {0x7ff, 0x40, 0x80, 0xff, 0x7fff, 0x81}, {0x20000000, 0x8c, 0x8, 0x7fffffff, 0x2, 0xffffffff}, {0x7fffffff, 0x2, 0xc5b9, 0x5, 0x1f, 0x2}, {0x5, 0x4, 0x80000000, 0x100, 0x6, 0x1804}, {0x2, 0x80000000, 0x8000, 0x1ff, 0x6, 0x5}, {0xd4c, 0x1ea757e0, 0xffffffff, 0x933b, 0x101}, {0x8000, 0x5, 0x3e77, 0x4, 0xff, 0xad33}, {0x4, 0xfffffffe, 0x6, 0xce8, 0x4, 0x3}, {0x8, 0x8, 0x0, 0xff, 0x1f, 0x9}, {0x8, 0x101, 0x9, 0x40, 0x6, 0x3}, {0x5, 0x1d2, 0x3, 0x40, 0xa726, 0x899}, {0xe81, 0x4, 0x100, 0x7a, 0x0, 0xdfa8000}, {0x4, 0x100, 0x2e06db40, 0xd024, 0x800, 0x100}, {0xfffff949, 0x4, 0x3, 0x0, 0x86ca, 0x7}, {0x0, 0x0, 0x3f, 0x7, 0x8509, 0x1}, {0x2, 0xe0, 0x3, 0x2, 0x8, 0x6}, {0x5, 0xfff, 0x0, 0x40, 0x1f, 0x5}, {0x0, 0x8, 0x1, 0x0, 0x5, 0x3}, {0x2, 0x2, 0x7, 0x2, 0x5700, 0x4f2}, {0xfffffff8, 0x7, 0x6, 0x200, 0x400, 0x1a}, {0x0, 0x101, 0xf4, 0x40, 0x5, 0x9}, {0x9, 0x100, 0x0, 0x6, 0x2d5, 0x80000001}, {0x8001, 0x0, 0x8, 0x0, 0x7, 0x5}, {0x2, 0x5, 0x695, 0x40, 0x0, 0xffffffff}, {0x7fff, 0xfffffff9, 0x8001, 0x1, 0x4b, 0x3}, {0x6, 0x80000001, 0x5, 0x1, 0x868, 0x1}, {0x2cc, 0x0, 0xfffffffb, 0x1, 0xffffffff, 0x1}, {0x7, 0x0, 0x6, 0xbc7, 0x585, 0xffff5d6b}, {0x9, 0x1, 0x2252cdfa, 0x3f, 0x236, 0x7fffffff}, {0x2aa, 0x7fffffff, 0x6, 0x0, 0x100, 0xfffff800}, {0x3f, 0x80000001, 0x62, 0xfffffff8, 0xffff, 0x1}], [{0x1}, {0x2, 0x1}, {0x4}, {0x4}, {}, {0x1}, {0x1}, {0x2, 0x1}, {0x5}, {0x0, 0x1}, {0x0, 0x1}, {0x3}, {0x0, 0x1}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x5}, {0x4, 0x1}, {0x1, 0x1}, {0x4}, {0x4}, {0x2, 0x1}, {0x3}, {0x4, 0x1}, {0x2, 0x1}, {0x4}, {}, {0x1}, {}, {0x4}, {0x6}, {0x3, 0x1}, {0x2}, {}, {0x2, 0x1}, {0x4}, {0x2, 0x1}, {0x5, 0x1}, {0x5}, {0x2}, {}, {0x1, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x5}, {0x5}, {0x5}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x1, 0x2}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x4}, {}, {0x5, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x3}, {0x2}, {}, {0x0, 0x1}, {}, {0x2, 0x1}, {0x1}, {0x4, 0xacb2e5b2cf7d0fc9}, {0x3, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x5}, {0x6, 0x1}, {0x0, 0x1}, {0x1}, {0x5}, {0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5}, {0x0, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x3}, {0x4, 0x1}, {0x3, 0x1}, {0x2}, {0x1, 0x1}, {0x1, 0x1}, {0x3}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x4}, {0x2, 0x1}, {0x5}, {0x2}, {0x2}, {0x2}, {0x1}, {0x0, 0x1}, {0x1}, {}, {0x5}, {0x4, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x2}], 0x1}}]}, {0xd7, 0x6, "ccb1dbf578a65c247587d1066eac06173ab5cdc926597be0b990be225efb5eb3b391a26ea56cd5f50ece8cbbe2df467a718721c03a530e613129d754d2a84bf7b383fc7fee9c145cedf78387b103b6c209cc98a87f2504b8da1565c5519a57ff4530975be778a45df688b50c08867780edfeaeda6e360884c51f0714808fff47d86e2c2e2006bd72792dc0dcc1e0eca7d01b17755d46436ed8c6786f5aaf87b6efd89ba6b4d5996909b661d944ba04e0db953a9030f09f0ff72a6c505edc5c37f587a61718f4da97707de0af8f2c3e2b2d57b6"}}}]}]}, 0x6eac}, 0x1, 0x0, 0x0, 0x20004040}, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)=[0x8000, 0x1]) 10:41:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x100000000000000) [ 314.882310][T20737] IPVS: ftp: loaded support on port[0] = 21 [ 314.891377][T20738] IPVS: ftp: loaded support on port[0] = 21 10:41:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x400000000000000) [ 314.933581][T20742] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 314.947833][T20740] IPVS: ftp: loaded support on port[0] = 21 10:41:18 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb, 0x9}) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0x13, 0x6, 0xfffa}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r4, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='/bdev\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r3, 0x0, 0x1, &(0x7f0000000040)='\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)='net/udp\x00', r5}, 0x30) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r5}, 0xc) r7 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r8 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r8, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) poll(&(0x7f0000000080)=[{}, {r0, 0x8}, {r1, 0x5464}, {r2, 0x100}, {r6, 0x9043}, {0xffffffffffffffff, 0x18c}, {r7, 0x1000}, {r8, 0x40}], 0x8, 0x3ee9000) 10:41:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x8000000000000000) 10:41:19 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xd001010000000000) 10:41:19 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xeffdffff00000000) [ 315.653009][T20744] IPVS: ftp: loaded support on port[0] = 21 10:41:19 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:22 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xf5ffffff00000000) 10:41:22 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, 0x0) 10:41:22 executing program 1: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) inotify_init() r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000104e, 0x104, 0x5}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0101000000000000000001000000440001000c00070000000000000000000c0006006c626c637200000008000b000000700008000800000000000800090000000000080001000a0000000800050002000000"], 0x58}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x44, r3, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x810) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0101000000000000000001000000440001000c00070000000000000000000c0006006c626c637200000008000b000000700008000800000000000800090000000000080001000a0000000800050002000000"], 0x58}}, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xe8, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xfe1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8e2}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x1}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x32}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbd}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}]}, 0xe8}, 0x1, 0x0, 0x0, 0x40010}, 0x8000) 10:41:22 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x2f00, 0x0}}], 0x1, 0x10000, 0x0) 10:41:22 executing program 4: unshare(0x40600) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000080)={0xffffffff, 0xb, 0xfffffffffffffffe}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x8c5c}, 0xc) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x40000000, 0x4) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x20400, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)={r3}) 10:41:23 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r0, 0x0, 0x0) 10:41:23 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xffffff7f00000000) [ 319.083859][T20864] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 319.109179][T20867] IPVS: ftp: loaded support on port[0] = 21 10:41:23 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000080)=0x4) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5, 0x802) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xe) [ 319.131765][T20864] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:41:23 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r2) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000200)={r4, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={r4, 0xe3b4, 0x6, 0x7}, &(0x7f0000000040)=0x10) getpeername$inet(r0, 0x0, 0x0) 10:41:23 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0xffffffff00000000) 10:41:23 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:23 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000000)=0xca, 0x4) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:23 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x0) getpeername$inet(r0, 0x0, 0x0) 10:41:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x3000, 0x0}}], 0x1, 0x10000, 0x0) [ 319.432462][T20923] IPVS: ftp: loaded support on port[0] = 21 10:41:23 executing program 5: syz_mount_image$btrfs(&(0x7f00000012c0)='btrfs\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',context=unconfined_u,obj_user=btrfs\x00,uid=', @ANYRESDEC, @ANYBLOB=',\x00']) 10:41:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000000040)=0x10000000, 0x4) close(r3) unshare(0x40600) ustat(0x3, &(0x7f0000000000)) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:23 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) shutdown(r0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x248a00, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0x8}) pidfd_getfd(r1, r0, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0x9, 0x1}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x5, 0x0, 0x3}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040090}, 0x48810) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000100)={0x8, {{0x2, 0x4e21, @remote}}}, 0xfffffffffffffec1) 10:41:23 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000180)=@tipc, 0x80, 0x0}}], 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/nvram\x00', 0x1, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000200)={0x2}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x5c000001}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x48, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0xffffffffffffffff}}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x3}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008004}, 0x1) 10:41:23 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001180)={0x1c, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x54, r3, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000891}, 0x24040001) 10:41:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x3002, 0x0}}], 0x1, 0x10000, 0x0) 10:41:24 executing program 4: unshare(0x40600) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x11) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x60802, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x3, 0x2, 0x3, 0x0, 0x0, {0x5, 0x0, 0x9}, ["", "", "", "", "", "", ""]}, 0x14}}, 0x4004081) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{}, {0x20, 'vmnet1$'}, {0x20, 'lolo\\vmnet1/{ppp1}'}, {0x20, '%^:lo:em1/&'}, {0x20, '/'}], 0xa, "0482149830b67322d6758d2eebab2a935aab0bddf6dc0e3de3c8ac471c9d9b6e51e61deeb130fa34ede24271c7bea95109aee02f95856099a7b001f6a290434568bcacfe43531098a0d0d04ad579c8b16ff0c873d12e0340bc0b6c"}, 0x90) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:24 executing program 3: socket$l2tp(0x2, 0x2, 0x73) pipe2(&(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001300)="1af6b8b10a26d89d777bd0420f378a811c439d6bf29471f0de8a1bc7ed80f44b06bf70b98c235550a2a1a6a608bbafb9f632a3b0fd41d227c7907fcf3481f352b59a0ca52b94fc6843a69c87fc92d353", 0x50) socket$kcm(0x29, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername$inet(r1, 0x0, 0x0) 10:41:24 executing program 1: unshare(0x40600) r0 = open(&(0x7f0000000000)='.\x00', 0x40, 0x178) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) [ 320.039334][T20967] IPVS: ftp: loaded support on port[0] = 21 [ 320.045720][ T312] tipc: TX() has been purged, node left! 10:41:24 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000080)={0x4, 0x8, 0x4, 0x4, 0x6, {r3, r4/1000+10000}, {0x4, 0x8, 0xfc, 0xd5, 0x9, 0x7, "1e042b43"}, 0x5, 0x4, @fd, 0x7f, 0x0, r1}) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) [ 320.141336][ T312] tipc: TX() has been purged, node left! [ 320.149710][ T312] tipc: TX() has been purged, node left! 10:41:24 executing program 4: unshare(0x14060e00) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x400000000000e, 0xb}) 10:41:24 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400000, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf, 0x1f, 0x2, 0x2}, 0xf) r1 = socket$l2tp(0x2, 0x2, 0x73) getpeername$inet(r1, 0x0, 0x0) [ 320.183984][ T312] tipc: TX() has been purged, node left! [ 320.342461][ T312] tipc: TX() has been purged, node left! [ 320.500059][ T312] tipc: TX() has been purged, node left!