k(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:24 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, 0xffffffffffffffff) 22:58:24 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:24 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:24 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:24 executing program 3: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) 22:58:24 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:24 executing program 4: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:24 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) 22:58:24 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, 0xffffffffffffffff) 22:58:24 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:25 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) epoll_create(0xfffffb0b) 22:58:25 executing program 3: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) 22:58:25 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:25 executing program 4: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') 22:58:25 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:25 executing program 3: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) 22:58:25 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, 0xffffffffffffffff) 22:58:25 executing program 4: fanotify_init(0x40, 0x101800) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) 22:58:25 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:25 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) epoll_create(0xfffffb0b) 22:58:25 executing program 3: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x0) 22:58:25 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:25 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) 22:58:25 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, 0xffffffffffffffff) 22:58:25 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:25 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) epoll_create(0xfffffb0b) 22:58:25 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, 0xffffffffffffffff) 22:58:25 executing program 3: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) 22:58:25 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:25 executing program 4: openat$incfs(0xffffffffffffff9c, 0x0, 0x2a2000, 0x100) 22:58:25 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:25 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) epoll_create(0xfffffb0b) 22:58:25 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) 22:58:25 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:25 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:25 executing program 4: openat$incfs(0xffffffffffffff9c, 0x0, 0x2a2000, 0x100) 22:58:25 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) epoll_create(0xfffffb0b) 22:58:25 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:25 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) [ 813.591264][ T1216] ieee802154 phy0 wpan0: encryption failed: -22 [ 813.597712][ T1216] ieee802154 phy1 wpan1: encryption failed: -22 22:58:25 executing program 4: openat$incfs(0xffffffffffffff9c, 0x0, 0x2a2000, 0x100) 22:58:25 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:25 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') epoll_create(0xfffffb0b) 22:58:25 executing program 1: fanotify_init(0x40, 0x101800) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:25 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:25 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:25 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) 22:58:25 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) 22:58:25 executing program 5: fanotify_init(0x40, 0x101800) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) epoll_create(0xfffffb0b) 22:58:25 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:25 executing program 1: fanotify_init(0x40, 0x101800) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:25 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:25 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) 22:58:25 executing program 5: fanotify_init(0x40, 0x101800) epoll_create(0xfffffb0b) 22:58:25 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) 22:58:25 executing program 1: sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:26 executing program 5: epoll_create(0xfffffb0b) 22:58:26 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) 22:58:26 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 1: sendto$llc(0xffffffffffffffff, 0x0, 0x0, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:26 executing program 5: epoll_create(0x0) 22:58:26 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x0) 22:58:26 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 1: sendto$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:26 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 1: sendto$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 22:58:26 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) 22:58:26 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:26 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:26 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:26 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:26 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 22:58:26 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, 0xffffffffffffffff) 22:58:27 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:27 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 22:58:27 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:27 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 22:58:27 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 22:58:27 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:27 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 22:58:27 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:27 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) 22:58:27 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:27 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:27 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:27 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:28 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:28 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:28 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:28 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:28 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 3: mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:28 executing program 3: mknodat(0xffffffffffffffff, 0x0, 0x1000, 0x5) 22:58:28 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:28 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) 22:58:28 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:28 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:28 executing program 3: mknodat(0xffffffffffffffff, 0x0, 0x1000, 0x5) 22:58:28 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:28 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:28 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:28 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r3, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 3: mknodat(0xffffffffffffffff, 0x0, 0x1000, 0x5) 22:58:28 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:28 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:28 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 3: mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:28 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:28 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:28 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 3: mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 22:58:28 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:28 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x0) 22:58:28 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:28 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:29 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:29 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:29 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:29 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:29 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r2, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:29 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:29 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:29 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:29 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:29 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 22:58:29 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:29 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:29 executing program 2: mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:29 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:29 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) 22:58:29 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:29 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:29 executing program 2: mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:29 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:29 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:29 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:29 executing program 2: mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) 22:58:29 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:29 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:29 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:29 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) 22:58:29 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:29 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:29 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:29 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 22:58:29 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:29 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 22:58:29 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x0) 22:58:29 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:30 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) 22:58:30 executing program 5: syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:30 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:30 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:30 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:30 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) 22:58:30 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) 22:58:30 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:30 executing program 5: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:30 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:30 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:30 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:30 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x602000, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:30 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) 22:58:30 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:30 executing program 5: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:30 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) 22:58:30 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:30 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:30 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x0, 0x5) 22:58:30 executing program 5: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:30 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x20) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:30 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) 22:58:30 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) 22:58:30 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:30 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:30 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x0, 0x5) 22:58:30 executing program 5: syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0x0) 22:58:30 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 22:58:30 executing program 0: faccessat2(0xffffffffffffff9c, 0x0, 0x4, 0x1000) 22:58:30 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:30 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x0, 0x5) 22:58:30 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:30 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) 22:58:30 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) 22:58:30 executing program 0: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x1000) 22:58:30 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 22:58:30 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:30 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 22:58:30 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) 22:58:30 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) 22:58:30 executing program 0: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:58:30 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:30 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:30 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) 22:58:31 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) 22:58:31 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) 22:58:31 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:31 executing program 0: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:58:31 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:31 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:31 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:31 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:31 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) 22:58:31 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:31 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:31 executing program 0: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:58:31 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) 22:58:31 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) 22:58:31 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:31 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:31 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) 22:58:31 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:31 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) 22:58:31 executing program 3: faccessat2(0xffffffffffffff9c, 0x0, 0x4, 0x1000) 22:58:31 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:31 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:31 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 22:58:31 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:31 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 22:58:31 executing program 3: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x1000) 22:58:31 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x5) 22:58:31 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:31 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:31 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) 22:58:31 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) 22:58:31 executing program 3: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:58:31 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x0) 22:58:31 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x0, 0x0) mknodat(r0, 0x0, 0x1000, 0x5) 22:58:31 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) 22:58:31 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) 22:58:31 executing program 3: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:58:31 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:31 executing program 0: mknodat(0xffffffffffffffff, 0x0, 0x1000, 0x5) 22:58:31 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) 22:58:31 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) 22:58:31 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) 22:58:31 executing program 3: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:58:31 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:32 executing program 0: mknodat(0xffffffffffffffff, 0x0, 0x0, 0x5) 22:58:32 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:32 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:32 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) 22:58:32 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:32 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) 22:58:32 executing program 0: mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:58:32 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) 22:58:32 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r6, 0xab00, 0xffffffffffffffff) 22:58:32 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r6, 0xab00, 0xffffffffffffffff) 22:58:32 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:32 executing program 4: linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:32 executing program 5: faccessat2(0xffffffffffffff9c, 0x0, 0x4, 0x1000) 22:58:32 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:32 executing program 3: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) 22:58:32 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r6, 0xab00, 0xffffffffffffffff) 22:58:32 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:32 executing program 4: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:32 executing program 5: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x1000) 22:58:32 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:32 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:32 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) ioctl$NBD_SET_SOCK(r6, 0xab00, 0xffffffffffffffff) 22:58:32 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:32 executing program 5: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:58:32 executing program 4: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:32 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:32 executing program 5: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:58:32 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:32 executing program 4: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:32 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:32 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:32 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:32 executing program 5: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:58:32 executing program 4: linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x400) 22:58:32 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:32 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:32 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:32 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 22:58:32 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 22:58:32 executing program 4: linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x0) 22:58:33 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:33 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:33 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x400) 22:58:33 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:33 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:33 executing program 5: linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x400) 22:58:33 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:33 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:33 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x400) 22:58:33 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:33 executing program 5: linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x400) 22:58:33 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 22:58:33 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x400) 22:58:33 executing program 2: syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:33 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:33 executing program 5: linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x400) 22:58:33 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) 22:58:33 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 22:58:33 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:33 executing program 2: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:33 executing program 5: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x400) 22:58:33 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:33 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:33 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x400) 22:58:33 executing program 5: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) 22:58:33 executing program 2: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:33 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:33 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x400) 22:58:33 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) 22:58:33 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:33 executing program 2: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:33 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:33 executing program 4: syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:33 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x400) 22:58:33 executing program 2: syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0x0) 22:58:33 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:33 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) 22:58:33 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) 22:58:33 executing program 4: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:33 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:34 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) 22:58:34 executing program 4: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:34 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:34 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:34 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) 22:58:34 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) 22:58:34 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) 22:58:34 executing program 4: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:34 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:34 executing program 5: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 22:58:34 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:34 executing program 4: syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0x0) 22:58:34 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:34 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) 22:58:34 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:34 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:34 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:34 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:34 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) 22:58:34 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:34 executing program 4: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:34 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:34 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x100) 22:58:34 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:34 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:34 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:34 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:34 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x100) 22:58:34 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) 22:58:34 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:34 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 22:58:34 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:34 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:34 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x100) 22:58:34 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:34 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:34 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) 22:58:34 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x0) 22:58:34 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) 22:58:35 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:35 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:35 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:35 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) 22:58:35 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:35 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) 22:58:35 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:35 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:35 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) 22:58:35 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) 22:58:35 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:35 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:35 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:35 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:35 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) 22:58:35 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) 22:58:35 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:35 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:35 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:35 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:35 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:35 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:35 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) 22:58:35 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:35 executing program 1: syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:35 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) 22:58:35 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:35 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) 22:58:35 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:35 executing program 1: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:35 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:35 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) 22:58:35 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:35 executing program 1: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:35 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:35 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) 22:58:35 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:36 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:36 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:36 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) 22:58:36 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:36 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:36 executing program 1: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:36 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:36 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:36 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) 22:58:36 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:36 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:36 executing program 1: syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0x0) 22:58:36 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) 22:58:36 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:36 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:36 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:36 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:36 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:36 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) 22:58:36 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 22:58:36 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:36 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:36 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:36 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:36 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) 22:58:36 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:36 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:36 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:36 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:36 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) 22:58:36 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:36 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:36 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) fspick(r4, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:36 executing program 3: syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:36 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:37 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) 22:58:37 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:37 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) fspick(r4, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:37 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:37 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:37 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:37 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') 22:58:37 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:37 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 22:58:37 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:37 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:37 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:37 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) 22:58:37 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:37 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0xa0000) 22:58:37 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:37 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:37 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) 22:58:37 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:37 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:37 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:37 executing program 3: syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0x0) 22:58:37 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) 22:58:37 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:37 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:37 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:37 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) 22:58:37 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:37 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) 22:58:37 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:37 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:37 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:37 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:37 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 22:58:37 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:37 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) 22:58:37 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:37 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:38 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:38 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 22:58:38 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:38 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) 22:58:38 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:38 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:38 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:38 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 22:58:38 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:38 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) 22:58:38 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:38 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:38 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:38 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:38 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:38 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) getdents64(0xffffffffffffffff, &(0x7f0000000180)=""/208, 0xd0) 22:58:38 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) 22:58:38 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:38 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:38 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:38 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) 22:58:38 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) getdents64(0xffffffffffffffff, &(0x7f0000000180)=""/208, 0xd0) 22:58:38 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:38 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:38 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:38 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:38 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) getdents64(0xffffffffffffffff, &(0x7f0000000180)=""/208, 0xd0) 22:58:38 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:38 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) 22:58:38 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:38 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:38 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:38 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:38 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) 22:58:38 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:38 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:38 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:38 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) 22:58:38 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:39 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:39 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:39 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:39 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:39 executing program 0: fanotify_init(0x40, 0x101800) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r0, &(0x7f0000000180)=""/208, 0xd0) 22:58:39 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:39 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:39 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:39 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:39 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:39 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 0: fanotify_init(0x40, 0x101800) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r0, &(0x7f0000000180)=""/208, 0xd0) 22:58:39 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:39 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:39 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r0, &(0x7f0000000180)=""/208, 0xd0) 22:58:39 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:39 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:39 executing program 5: fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:39 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:39 executing program 4: fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:39 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) 22:58:39 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x8100, 0x0) getdents64(r0, &(0x7f0000000180)=""/208, 0xd0) 22:58:39 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:39 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:39 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 4: fspick(0xffffffffffffffff, 0x0, 0x1) 22:58:39 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x8100, 0x0) getdents64(r0, &(0x7f0000000180)=""/208, 0xd0) 22:58:39 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:39 executing program 4: fspick(0xffffffffffffffff, 0x0, 0x0) 22:58:39 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x8100, 0x0) getdents64(r0, &(0x7f0000000180)=""/208, 0xd0) 22:58:39 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:39 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:39 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getdents64(r0, &(0x7f0000000180)=""/208, 0xd0) 22:58:39 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:39 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:40 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:40 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:40 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) fspick(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:40 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000180)=""/208, 0xd0) 22:58:40 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:40 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) fspick(r4, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:40 executing program 2: socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:40 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:40 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000180)=""/208, 0xd0) 22:58:40 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:40 executing program 2: socketpair(0x0, 0x6, 0x772c, &(0x7f0000000740)) 22:58:40 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 22:58:40 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:40 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 22:58:40 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000180)=""/208, 0xd0) 22:58:40 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:40 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) 22:58:40 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getdents64(r0, 0x0, 0x0) 22:58:40 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:40 executing program 4: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) 22:58:40 executing program 1: faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:40 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:40 executing program 2: socketpair(0x0, 0x6, 0x772c, &(0x7f0000000740)) 22:58:40 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:40 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:40 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x2) 22:58:40 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:40 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x0) 22:58:40 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:40 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:40 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:40 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:40 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:40 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:41 executing program 2: socketpair(0x0, 0x6, 0x772c, &(0x7f0000000740)) 22:58:41 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:41 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:41 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:41 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:41 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:41 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:41 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:41 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 22:58:41 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) 22:58:41 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:41 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:41 executing program 2: socketpair(0x2b, 0x0, 0x772c, &(0x7f0000000740)) 22:58:41 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 22:58:41 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) 22:58:41 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) 22:58:41 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:41 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:41 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:41 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240), &(0x7f0000001280)) 22:58:41 executing program 2: socketpair(0x2b, 0x0, 0x0, &(0x7f0000000740)) 22:58:41 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) 22:58:41 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:41 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:41 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:41 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) 22:58:41 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) 22:58:41 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:41 executing program 2: socketpair(0x2b, 0x0, 0x0, 0x0) 22:58:41 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) 22:58:41 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:41 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) 22:58:41 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) 22:58:41 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) 22:58:41 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:41 executing program 2: socketpair(0x2b, 0x0, 0x0, 0x0) 22:58:41 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:41 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) 22:58:41 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) 22:58:41 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:42 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x6a24c0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:42 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 22:58:42 executing program 2: socketpair(0x2b, 0x0, 0x0, 0x0) 22:58:42 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:42 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x6a24c0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:42 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) 22:58:42 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:42 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) 22:58:42 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:42 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x6a24c0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:42 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) 22:58:42 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:42 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) 22:58:42 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:42 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 22:58:42 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) 22:58:42 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:42 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) 22:58:42 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) 22:58:42 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:42 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:42 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:42 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) 22:58:42 executing program 2: socketpair(0x0, 0x6, 0x772c, &(0x7f0000000740)) 22:58:42 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) 22:58:42 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) 22:58:42 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) 22:58:42 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:42 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) 22:58:42 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:42 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) 22:58:42 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) 22:58:42 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:42 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:42 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) 22:58:43 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:43 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) 22:58:43 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) 22:58:43 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:43 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:43 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:43 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) 22:58:43 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) 22:58:43 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:43 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:43 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:43 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:43 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) 22:58:43 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) 22:58:43 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1) 22:58:43 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:43 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) 22:58:43 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 22:58:43 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:43 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) 22:58:43 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1) 22:58:43 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:43 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') 22:58:43 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) 22:58:43 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) 22:58:43 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:43 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1) 22:58:43 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1) 22:58:43 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) 22:58:43 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) 22:58:43 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:43 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) 22:58:43 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:43 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1) 22:58:43 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) 22:58:43 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) 22:58:43 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:43 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1) 22:58:43 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:43 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') 22:58:43 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:43 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) 22:58:43 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:43 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:43 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:44 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 22:58:44 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) 22:58:44 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:44 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) 22:58:44 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:44 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:44 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) 22:58:44 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) 22:58:44 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:44 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) 22:58:44 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:44 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:44 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, 0x0, 0x25, 0xa}, 0x10) 22:58:44 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) 22:58:44 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:44 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) 22:58:44 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:44 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:44 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x25, 0xa}, 0x10) 22:58:44 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) 22:58:44 executing program 3: renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:44 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) 22:58:44 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:44 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:44 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x25, 0xa}, 0x10) 22:58:44 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) 22:58:44 executing program 3: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0) 22:58:44 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) 22:58:44 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:44 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x25, 0xa}, 0x10) 22:58:44 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1) 22:58:44 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:44 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) 22:58:44 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) 22:58:44 executing program 3: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 22:58:44 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, 0x0, 0x25, 0xa}, 0x10) 22:58:44 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1) 22:58:44 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) 22:58:44 executing program 0: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:44 executing program 3: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) 22:58:44 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:44 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, 0x0, 0x25, 0xa}, 0x10) 22:58:44 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1) 22:58:44 executing program 0: fanotify_init(0x40, 0x101800) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r0, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:44 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:44 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) 22:58:44 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:45 executing program 0: fanotify_init(0x40, 0x101800) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, 0xffffffffffffffff, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:45 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, 0x0, 0x25, 0xa}, 0x10) 22:58:45 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) 22:58:45 executing program 2: renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1) 22:58:45 executing program 3: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) 22:58:45 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:45 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, 0x0, 0x25, 0xa}, 0x10) 22:58:45 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1) 22:58:45 executing program 4: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, 0xffffffffffffffff, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:45 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:45 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) 22:58:45 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, 0x0, 0x25, 0xa}, 0x10) 22:58:45 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 22:58:45 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:45 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:58:45 executing program 1: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') 22:58:45 executing program 4: syz_open_dev$usbmon(0x0, 0xffffffffffff8000, 0x400000) 22:58:45 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:45 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, 0x0, 0x25, 0xa}, 0x10) 22:58:45 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:45 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:58:45 executing program 1: r0 = fanotify_init(0x40, 0x101800) fanotify_mark(r0, 0x20, 0x8000010, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 22:58:45 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:45 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:58:45 executing program 4: syz_open_dev$usbmon(0x0, 0xffffffffffff8000, 0x400000) 22:58:45 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:45 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, 0x0, 0x25, 0xa}, 0x10) 22:58:45 executing program 1: fanotify_mark(0xffffffffffffffff, 0x20, 0x8000010, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 22:58:45 executing program 4: syz_open_dev$usbmon(0x0, 0xffffffffffff8000, 0x400000) 22:58:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x8001, 0x3, 0x10, 0xffffffffffffffff, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:45 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:45 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, 0x0, 0x25, 0xa}, 0x10) 22:58:45 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:45 executing program 1: fanotify_mark(0xffffffffffffffff, 0x0, 0x8000010, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 22:58:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x3, 0x10, 0xffffffffffffffff, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:45 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) 22:58:45 executing program 2: r0 = fanotify_init(0x40, 0x101800) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2a2000, 0x100) fanotify_mark(r0, 0x20, 0x8000010, r1, &(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1520, 0x8001, 0x3, 0x10, r1, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0xc5) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) getdents64(r2, &(0x7f0000000180)=""/208, 0xd0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/vhost', 0x8101, 0x4) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f00000002c0)=0x1, 0x4) epoll_create(0xfffffb0b) sendto$llc(0xffffffffffffffff, &(0x7f0000000300)="45b0e776543dcb64c91ce766f133aff888b1ddd101a88bb584b28a1f235f02f673a9fa77c3536be28a6593095677519373723dcd62bc612a6b19966671603cdd042556e35d76226cb3ed16fca7671796626750f1635110fd492b3f81a873441f09ebd3fb6eb3f83bf4805c5e4afe68cc7e437c01c1bbf381299fd42210359e7468ace6a326a6b377004fb86dfce0844380b381b83e48dfdddc9dc186d56f6e4ca50cf89fff3d", 0xa6, 0xc000, &(0x7f00000003c0)={0x1a, 0x8, 0x20, 0x2, 0x7f, 0x0, @broadcast}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40040) bind$can_j1939(r1, &(0x7f0000000500)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x3}}, 0x18) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000005c0)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x70, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x24004000}, 0x40000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x200100, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r6, 0xc1086201, &(0x7f00000007c0)={'binder0\x00'}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/module/dvb_usb_a800', 0x2000, 0x40) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f0000000e00)={0x8, &(0x7f0000000940)=[{}, {@fixed}, {@none}, {}, {@fixed}, {}, {@none}, {}]}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x101c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000f00)={'ip6gre0\x00', &(0x7f0000000e80)={'ip6gre0\x00', 0x0, 0x29, 0x81, 0x0, 0x2, 0x34, @empty, @empty, 0x7, 0x10, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000fc0)={'syztnl1\x00', &(0x7f0000000f40)={'syztnl2\x00', r9, 0x4, 0x1, 0xfc, 0x7, 0x40, @remote, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x40, 0x700, 0x1, 0x2}}) r10 = openat$incfs(r1, &(0x7f0000001040)='.pending_reads\x00', 0x101100, 0x17) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001140)={&(0x7f0000001080)={0x98, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xb7b765e1e04fb723}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7e6}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '[{'}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000008}, 0x1) syz_io_uring_setup(0x34e9, &(0x7f00000011c0)={0x0, 0x1721, 0x20, 0x3, 0x39b, 0x0, r7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001240)=0x0, &(0x7f0000001280)) syz_io_uring_submit(r11, 0x0, &(0x7f0000001340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000012c0)=@can}, 0x8) 22:58:45 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x400000) 22:58:45 executing program 1: fanotify_mark(0xffffffffffffffff, 0x0, 0x8000010, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 22:58:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x10, 0xffffffffffffffff, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:46 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) 22:58:46 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) 22:58:46 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) 22:58:46 executing program 2: fanotify_mark(0xffffffffffffffff, 0x0, 0x8000010, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 22:58:46 executing program 1: fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 22:58:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:46 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) 22:58:46 executing program 2: fanotify_mark(0xffffffffffffffff, 0x0, 0x8000010, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 22:58:46 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) 22:58:46 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) 22:58:46 executing program 1: fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:58:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x48) 22:58:46 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x25, 0xa}, 0x10) 22:58:46 executing program 2: fanotify_mark(0xffffffffffffffff, 0x0, 0x8000010, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 22:58:46 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) 22:58:46 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:46 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) 22:58:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5, 0xb}, 0x48) 22:58:46 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x25, 0xa}, 0x10) 22:58:46 executing program 2: fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 22:58:46 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) 22:58:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xb}, 0x48) 22:58:46 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:46 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x25, 0xa}, 0x10) 22:58:46 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) 22:58:46 executing program 2: fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:58:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb}, 0x48) 22:58:46 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) 22:58:46 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:46 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0}, 0x10) 22:58:46 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) 22:58:46 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:46 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) 22:58:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb}, 0x48) 22:58:46 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:46 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) 22:58:46 executing program 4: syz_open_dev$usbmon(0x0, 0x0, 0x0) 22:58:46 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 22:58:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb}, 0x48) 22:58:46 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:46 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 22:58:46 executing program 4: syz_open_dev$usbmon(0x0, 0x0, 0x0) 22:58:46 executing program 5: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:46 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 22:58:47 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:47 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:47 executing program 4: syz_open_dev$usbmon(0x0, 0x0, 0x0) 22:58:47 executing program 0: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) fchmodat(r3, &(0x7f0000000840)='./file0\x00', 0x20) 22:58:47 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 22:58:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) (fail_nth: 1) 22:58:47 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) 22:58:47 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) r9 = openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) ioctl$NBD_SET_SOCK(r8, 0xab00, r9) 22:58:47 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 1) 22:58:47 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 1) [ 835.245792][T15043] FAULT_INJECTION: forcing a failure. [ 835.245792][T15043] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 835.319535][T15043] CPU: 1 PID: 15043 Comm: syz-executor.5 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 835.329568][T15043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 835.341406][T15043] Call Trace: [ 835.344704][T15043] [ 835.347655][T15043] dump_stack_lvl+0x136/0x150 [ 835.352436][T15043] should_fail_ex+0x4a3/0x5b0 [ 835.357259][T15043] _copy_from_user+0x2e/0x180 [ 835.362010][T15043] __sys_bpf+0x1d0/0x53b0 [ 835.366490][T15043] ? ksys_write+0x210/0x250 [ 835.371118][T15043] ? lock_downgrade+0x690/0x690 [ 835.376021][T15043] ? bpf_perf_link_attach+0x520/0x520 [ 835.381466][T15043] ? vfs_write+0x4a7/0xe20 [ 835.385929][T15043] ? __mutex_unlock_slowpath+0x157/0x5e0 [ 835.391617][T15043] ? wait_for_completion_io_timeout+0x20/0x20 [ 835.397763][T15043] ? fput+0x2f/0x1a0 [ 835.401718][T15043] ? ksys_write+0x1a3/0x250 [ 835.406270][T15043] __x64_sys_bpf+0x79/0xc0 [ 835.410727][T15043] ? syscall_enter_from_user_mode+0x26/0x80 [ 835.416700][T15043] do_syscall_64+0x39/0xb0 [ 835.421155][T15043] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 835.427259][T15043] RIP: 0033:0x7fae97a8c0f9 [ 835.431703][T15043] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 835.451352][T15043] RSP: 002b:00007fae988ae168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 835.459796][T15043] RAX: ffffffffffffffda RBX: 00007fae97babf80 RCX: 00007fae97a8c0f9 [ 835.467886][T15043] RDX: 0000000000000048 RSI: 0000000020000080 RDI: 0000000000000000 [ 835.475877][T15043] RBP: 00007fae988ae1d0 R08: 0000000000000000 R09: 0000000000000000 [ 835.485185][T15043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 835.493359][T15043] R13: 00007fffebbca5df R14: 00007fae988ae300 R15: 0000000000022000 [ 835.501410][T15043] 22:58:47 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) 22:58:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) (fail_nth: 2) 22:58:47 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0}, 0x10) (fail_nth: 1) [ 835.531356][T15051] FAULT_INJECTION: forcing a failure. [ 835.531356][T15051] name failslab, interval 1, probability 0, space 0, times 1 [ 835.557823][T15053] FAULT_INJECTION: forcing a failure. [ 835.557823][T15053] name failslab, interval 1, probability 0, space 0, times 1 [ 835.592553][T15051] CPU: 1 PID: 15051 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 835.602649][T15051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 835.612752][T15051] Call Trace: [ 835.616071][T15051] [ 835.619050][T15051] dump_stack_lvl+0x136/0x150 [ 835.623823][T15051] should_fail_ex+0x4a3/0x5b0 [ 835.629037][T15051] should_failslab+0x9/0x20 [ 835.633683][T15051] kmem_cache_alloc+0x63/0x3b0 [ 835.638559][T15051] ? lock_downgrade+0x690/0x690 [ 835.643566][T15051] getname_flags.part.0+0x50/0x4f0 [ 835.648863][T15051] getname+0x92/0xd0 [ 835.652805][T15051] do_sys_openat2+0xf5/0x4c0 [ 835.657463][T15051] ? build_open_flags+0x720/0x720 [ 835.662553][T15051] __x64_sys_openat+0x143/0x1f0 [ 835.667478][T15051] ? __ia32_sys_open+0x1c0/0x1c0 [ 835.672465][T15051] ? ksys_write+0x1a3/0x250 [ 835.677046][T15051] ? syscall_enter_from_user_mode+0x26/0x80 [ 835.683036][T15051] do_syscall_64+0x39/0xb0 [ 835.687518][T15051] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 835.693474][T15051] RIP: 0033:0x7f31e643e284 [ 835.697939][T15051] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 835.717791][T15051] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 835.726258][T15051] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 835.734272][T15051] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 835.742376][T15051] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 835.750388][T15051] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 835.758419][T15051] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 835.766539][T15051] [ 835.771070][T15053] CPU: 0 PID: 15053 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 835.781043][T15053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 22:58:47 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) openat$incfs(r6, &(0x7f0000000800)='.pending_reads\x00', 0x80080, 0x66) [ 835.791161][T15053] Call Trace: [ 835.794483][T15053] [ 835.797459][T15053] dump_stack_lvl+0x136/0x150 [ 835.802209][T15053] should_fail_ex+0x4a3/0x5b0 [ 835.806956][T15053] should_failslab+0x9/0x20 [ 835.811525][T15053] kmem_cache_alloc+0x63/0x3b0 [ 835.816346][T15053] ? lock_downgrade+0x690/0x690 [ 835.821271][T15053] getname_flags.part.0+0x50/0x4f0 [ 835.826479][T15053] getname+0x92/0xd0 [ 835.830434][T15053] do_sys_openat2+0xf5/0x4c0 [ 835.835127][T15053] ? build_open_flags+0x720/0x720 [ 835.835854][T15059] FAULT_INJECTION: forcing a failure. [ 835.835854][T15059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 835.840234][T15053] __x64_sys_openat+0x143/0x1f0 [ 835.840284][T15053] ? __ia32_sys_open+0x1c0/0x1c0 [ 835.863191][T15053] ? ksys_write+0x1a3/0x250 [ 835.867756][T15053] ? syscall_enter_from_user_mode+0x26/0x80 [ 835.873721][T15053] do_syscall_64+0x39/0xb0 [ 835.878217][T15053] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 835.884162][T15053] RIP: 0033:0x7f954c23e284 [ 835.888600][T15053] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 835.908932][T15053] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 835.917393][T15053] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 835.925401][T15053] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 835.933395][T15053] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 835.941389][T15053] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 835.949555][T15053] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 835.957569][T15053] [ 835.977968][T15059] CPU: 0 PID: 15059 Comm: syz-executor.0 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 835.987933][T15059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 835.998104][T15059] Call Trace: [ 836.001423][T15059] [ 836.004379][T15059] dump_stack_lvl+0x136/0x150 [ 836.009118][T15059] should_fail_ex+0x4a3/0x5b0 [ 836.013858][T15059] _copy_from_user+0x2e/0x180 [ 836.018582][T15059] __sys_bpf+0x1d0/0x53b0 [ 836.022954][T15059] ? ksys_write+0x210/0x250 [ 836.027580][T15059] ? lock_downgrade+0x690/0x690 [ 836.032469][T15059] ? bpf_perf_link_attach+0x520/0x520 [ 836.037890][T15059] ? vfs_write+0x4a7/0xe20 [ 836.042470][T15059] ? __mutex_unlock_slowpath+0x157/0x5e0 [ 836.048147][T15059] ? wait_for_completion_io_timeout+0x20/0x20 [ 836.054280][T15059] ? fput+0x2f/0x1a0 [ 836.058229][T15059] ? ksys_write+0x1a3/0x250 [ 836.062803][T15059] __x64_sys_bpf+0x79/0xc0 [ 836.067258][T15059] ? syscall_enter_from_user_mode+0x26/0x80 [ 836.073206][T15059] do_syscall_64+0x39/0xb0 [ 836.077671][T15059] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 836.083628][T15059] RIP: 0033:0x7f4592e8c0f9 [ 836.088246][T15059] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 836.107879][T15059] RSP: 002b:00007f4593cc3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 836.116316][T15059] RAX: ffffffffffffffda RBX: 00007f4592fabf80 RCX: 00007f4592e8c0f9 [ 836.124310][T15059] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 000000000000001c [ 836.132302][T15059] RBP: 00007f4593cc31d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.140296][T15059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 836.148307][T15059] R13: 00007ffdbcd2b64f R14: 00007f4593cc3300 R15: 0000000000022000 [ 836.158160][T15059] 22:58:48 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0), 0x800, 0x0) 22:58:48 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0}, 0x10) (fail_nth: 2) 22:58:48 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 2) [ 836.205512][T15061] FAULT_INJECTION: forcing a failure. [ 836.205512][T15061] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 836.230555][T15061] CPU: 0 PID: 15061 Comm: syz-executor.5 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 836.240547][T15061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 836.250659][T15061] Call Trace: [ 836.253982][T15061] [ 836.256961][T15061] dump_stack_lvl+0x136/0x150 [ 836.261717][T15061] should_fail_ex+0x4a3/0x5b0 [ 836.266487][T15061] _copy_to_user+0x2e/0x150 [ 836.271073][T15061] simple_read_from_buffer+0xd0/0x160 [ 836.276604][T15061] proc_fail_nth_read+0x18b/0x220 [ 836.281771][T15061] ? proc_fault_inject_read+0x220/0x220 [ 836.287404][T15061] ? security_file_permission+0xaf/0xd0 [ 836.288994][T15065] FAULT_INJECTION: forcing a failure. [ 836.288994][T15065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 836.293088][T15061] vfs_read+0x264/0x940 [ 836.293141][T15061] ? proc_fault_inject_read+0x220/0x220 [ 836.293198][T15061] ? kernel_read+0x1c0/0x1c0 [ 836.293241][T15061] ? receive_fd+0x110/0x110 [ 836.325132][T15061] ? __fget_files+0x26a/0x480 [ 836.329891][T15061] ksys_read+0x12b/0x250 [ 836.334283][T15061] ? vfs_write+0xe20/0xe20 [ 836.338756][T15061] ? syscall_enter_from_user_mode+0x26/0x80 [ 836.344722][T15061] do_syscall_64+0x39/0xb0 [ 836.349215][T15061] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 836.355183][T15061] RIP: 0033:0x7fae97a3df1c [ 836.359645][T15061] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 836.380096][T15061] RSP: 002b:00007fae988ae160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 836.388548][T15061] RAX: ffffffffffffffda RBX: 00007fae97babf80 RCX: 00007fae97a3df1c [ 836.396551][T15061] RDX: 000000000000000f RSI: 00007fae988ae1e0 RDI: 0000000000000003 22:58:48 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 2) [ 836.404633][T15061] RBP: 00007fae988ae1d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.412630][T15061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 836.420636][T15061] R13: 00007fffebbca5df R14: 00007fae988ae300 R15: 0000000000022000 [ 836.428706][T15061] [ 836.446074][T15065] CPU: 1 PID: 15065 Comm: syz-executor.0 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 836.451774][T15066] FAULT_INJECTION: forcing a failure. [ 836.451774][T15066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 836.456047][T15065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 836.479211][T15065] Call Trace: [ 836.482512][T15065] [ 836.485479][T15065] dump_stack_lvl+0x136/0x150 [ 836.490305][T15065] should_fail_ex+0x4a3/0x5b0 [ 836.495073][T15065] _copy_to_user+0x2e/0x150 [ 836.499649][T15065] simple_read_from_buffer+0xd0/0x160 [ 836.505095][T15065] proc_fail_nth_read+0x18b/0x220 [ 836.510192][T15065] ? proc_fault_inject_read+0x220/0x220 [ 836.516071][T15065] ? security_file_permission+0xaf/0xd0 [ 836.521703][T15065] vfs_read+0x264/0x940 [ 836.525930][T15065] ? proc_fault_inject_read+0x220/0x220 [ 836.531559][T15065] ? kernel_read+0x1c0/0x1c0 [ 836.536542][T15065] ? receive_fd+0x110/0x110 [ 836.541108][T15065] ? __fget_files+0x26a/0x480 [ 836.545859][T15065] ksys_read+0x12b/0x250 [ 836.550187][T15065] ? vfs_write+0xe20/0xe20 [ 836.554673][T15065] ? syscall_enter_from_user_mode+0x26/0x80 [ 836.560660][T15065] do_syscall_64+0x39/0xb0 [ 836.565146][T15065] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 836.571138][T15065] RIP: 0033:0x7f4592e3df1c [ 836.575600][T15065] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 836.595256][T15065] RSP: 002b:00007f4593cc3160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 836.603725][T15065] RAX: ffffffffffffffda RBX: 00007f4592fabf80 RCX: 00007f4592e3df1c [ 836.611744][T15065] RDX: 000000000000000f RSI: 00007f4593cc31e0 RDI: 0000000000000004 [ 836.619746][T15065] RBP: 00007f4593cc31d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.627755][T15065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 836.635785][T15065] R13: 00007ffdbcd2b64f R14: 00007f4593cc3300 R15: 0000000000022000 [ 836.643914][T15065] [ 836.646968][T15066] CPU: 0 PID: 15066 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 22:58:48 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r7 = fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) 22:58:48 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) [ 836.656963][T15066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 836.667067][T15066] Call Trace: [ 836.670380][T15066] [ 836.673422][T15066] dump_stack_lvl+0x136/0x150 [ 836.678161][T15066] should_fail_ex+0x4a3/0x5b0 [ 836.682884][T15066] strncpy_from_user+0x38/0x3d0 [ 836.687813][T15066] getname_flags.part.0+0x95/0x4f0 [ 836.692962][T15066] getname+0x92/0xd0 [ 836.697146][T15066] do_sys_openat2+0xf5/0x4c0 [ 836.701778][T15066] ? build_open_flags+0x720/0x720 [ 836.706855][T15066] __x64_sys_openat+0x143/0x1f0 [ 836.711741][T15066] ? __ia32_sys_open+0x1c0/0x1c0 [ 836.716722][T15066] ? ksys_write+0x1a3/0x250 [ 836.721280][T15066] ? syscall_enter_from_user_mode+0x26/0x80 [ 836.727220][T15066] do_syscall_64+0x39/0xb0 [ 836.731666][T15066] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 836.737604][T15066] RIP: 0033:0x7f954c23e284 [ 836.742039][T15066] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 836.761674][T15066] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 836.770114][T15066] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 836.778205][T15066] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 836.786199][T15066] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 836.794191][T15066] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 22:58:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 836.802182][T15066] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 836.810189][T15066] 22:58:48 executing program 5: bpf$MAP_CREATE(0x2, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 836.852212][T15069] FAULT_INJECTION: forcing a failure. [ 836.852212][T15069] name fail_usercopy, interval 1, probability 0, space 0, times 0 22:58:48 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 836.911823][T15069] CPU: 0 PID: 15069 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 836.921807][T15069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 836.931910][T15069] Call Trace: [ 836.935223][T15069] [ 836.938191][T15069] dump_stack_lvl+0x136/0x150 [ 836.942938][T15069] should_fail_ex+0x4a3/0x5b0 [ 836.947694][T15069] strncpy_from_user+0x38/0x3d0 [ 836.952621][T15069] getname_flags.part.0+0x95/0x4f0 [ 836.957802][T15069] getname+0x92/0xd0 22:58:48 executing program 5: bpf$MAP_CREATE(0x4, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:48 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 3) [ 836.961767][T15069] do_sys_openat2+0xf5/0x4c0 [ 836.966426][T15069] ? build_open_flags+0x720/0x720 [ 836.971534][T15069] __x64_sys_openat+0x143/0x1f0 [ 836.976450][T15069] ? __ia32_sys_open+0x1c0/0x1c0 [ 836.981556][T15069] ? ksys_write+0x1a3/0x250 [ 836.986136][T15069] ? syscall_enter_from_user_mode+0x26/0x80 [ 836.992115][T15069] do_syscall_64+0x39/0xb0 [ 836.996592][T15069] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 837.002566][T15069] RIP: 0033:0x7f31e643e284 [ 837.007027][T15069] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 837.026684][T15069] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 837.035226][T15069] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 837.043222][T15069] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 837.051213][T15069] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 22:58:49 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0}, 0x10) 22:58:49 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) fspick(r5, &(0x7f0000000780)='./file0\x00', 0x1) 22:58:49 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 3) [ 837.059208][T15069] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 837.067201][T15069] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 837.075212][T15069] 22:58:49 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:49 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x2, &(0x7f0000000140)={r0}, 0x10) [ 837.135646][T15082] FAULT_INJECTION: forcing a failure. [ 837.135646][T15082] name failslab, interval 1, probability 0, space 0, times 0 22:58:49 executing program 5: bpf$MAP_CREATE(0x5, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:49 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:49 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) [ 837.244313][T15082] CPU: 1 PID: 15082 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 837.254284][T15082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 837.264385][T15082] Call Trace: [ 837.267697][T15082] [ 837.270670][T15082] dump_stack_lvl+0x136/0x150 [ 837.275425][T15082] should_fail_ex+0x4a3/0x5b0 [ 837.280193][T15082] should_failslab+0x9/0x20 [ 837.284779][T15082] kmem_cache_alloc+0x63/0x3b0 [ 837.289617][T15082] __alloc_file+0x21/0x270 [ 837.294117][T15082] alloc_empty_file+0x71/0x190 [ 837.298938][T15082] path_openat+0xe6/0x2750 [ 837.303398][T15082] ? path_lookupat+0x840/0x840 [ 837.308220][T15082] do_filp_open+0x1ba/0x410 [ 837.312766][T15082] ? may_open_dev+0xf0/0xf0 [ 837.317299][T15082] ? find_held_lock+0x2d/0x110 [ 837.322121][T15082] ? alloc_fd+0x2e4/0x750 [ 837.326491][T15082] ? do_raw_spin_lock+0x124/0x2b0 [ 837.331556][T15082] ? spin_bug+0x1c0/0x1c0 [ 837.335934][T15082] ? _raw_spin_unlock+0x28/0x40 [ 837.340902][T15082] ? alloc_fd+0x2e4/0x750 [ 837.345290][T15082] do_sys_openat2+0x16d/0x4c0 [ 837.350029][T15082] ? build_open_flags+0x720/0x720 [ 837.355120][T15082] __x64_sys_openat+0x143/0x1f0 [ 837.360015][T15082] ? __ia32_sys_open+0x1c0/0x1c0 [ 837.365086][T15082] ? ksys_write+0x1a3/0x250 [ 837.369646][T15082] ? syscall_enter_from_user_mode+0x26/0x80 [ 837.375613][T15082] do_syscall_64+0x39/0xb0 [ 837.380238][T15082] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 837.386194][T15082] RIP: 0033:0x7f954c23e284 [ 837.390656][T15082] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 837.410402][T15082] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 837.418951][T15082] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 837.426950][T15082] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 837.434946][T15082] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 22:58:49 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x3, &(0x7f0000000140)={r0}, 0x10) [ 837.442941][T15082] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 837.450933][T15082] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 837.458946][T15082] [ 837.484091][T15093] FAULT_INJECTION: forcing a failure. [ 837.484091][T15093] name failslab, interval 1, probability 0, space 0, times 0 [ 837.512018][T15093] CPU: 1 PID: 15093 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 837.521992][T15093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 837.532132][T15093] Call Trace: [ 837.535452][T15093] [ 837.538426][T15093] dump_stack_lvl+0x136/0x150 [ 837.543181][T15093] should_fail_ex+0x4a3/0x5b0 [ 837.547943][T15093] should_failslab+0x9/0x20 [ 837.552533][T15093] kmem_cache_alloc+0x63/0x3b0 [ 837.557360][T15093] __alloc_file+0x21/0x270 [ 837.561830][T15093] alloc_empty_file+0x71/0x190 [ 837.566647][T15093] path_openat+0xe6/0x2750 [ 837.571115][T15093] ? path_lookupat+0x840/0x840 [ 837.575923][T15093] do_filp_open+0x1ba/0x410 [ 837.580459][T15093] ? may_open_dev+0xf0/0xf0 [ 837.584990][T15093] ? find_held_lock+0x2d/0x110 [ 837.589790][T15093] ? alloc_fd+0x2e4/0x750 [ 837.594164][T15093] ? do_raw_spin_lock+0x124/0x2b0 [ 837.599240][T15093] ? spin_bug+0x1c0/0x1c0 [ 837.603617][T15093] ? _raw_spin_unlock+0x28/0x40 [ 837.608508][T15093] ? alloc_fd+0x2e4/0x750 [ 837.612882][T15093] do_sys_openat2+0x16d/0x4c0 [ 837.617595][T15093] ? build_open_flags+0x720/0x720 [ 837.622670][T15093] __x64_sys_openat+0x143/0x1f0 [ 837.627558][T15093] ? __ia32_sys_open+0x1c0/0x1c0 [ 837.632537][T15093] ? ksys_write+0x1a3/0x250 [ 837.637085][T15093] ? syscall_enter_from_user_mode+0x26/0x80 [ 837.643051][T15093] do_syscall_64+0x39/0xb0 [ 837.647591][T15093] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 837.653540][T15093] RIP: 0033:0x7f31e643e284 [ 837.657981][T15093] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 837.677710][T15093] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 837.686153][T15093] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 22:58:49 executing program 5: bpf$MAP_CREATE(0x6, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 837.694240][T15093] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 837.702233][T15093] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 837.710227][T15093] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 837.718222][T15093] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 837.726248][T15093] 22:58:49 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:49 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 4) 22:58:49 executing program 5: bpf$MAP_CREATE(0x7, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:49 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x4, &(0x7f0000000140)={r0}, 0x10) 22:58:49 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 4) 22:58:49 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) socketpair(0x2b, 0x6, 0x772c, &(0x7f0000000740)) 22:58:49 executing program 5: bpf$MAP_CREATE(0x8, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:49 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x5, &(0x7f0000000140)={r0}, 0x10) 22:58:49 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) getpeername$llc(0xffffffffffffffff, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000700)=0x10) 22:58:49 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) [ 837.928258][T15113] FAULT_INJECTION: forcing a failure. [ 837.928258][T15113] name failslab, interval 1, probability 0, space 0, times 0 [ 837.994782][T15113] CPU: 1 PID: 15113 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 838.004428][T15118] FAULT_INJECTION: forcing a failure. [ 838.004428][T15118] name failslab, interval 1, probability 0, space 0, times 0 [ 838.004768][T15113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 838.004790][T15113] Call Trace: [ 838.004799][T15113] [ 838.004811][T15113] dump_stack_lvl+0x136/0x150 [ 838.038496][T15113] should_fail_ex+0x4a3/0x5b0 [ 838.043259][T15113] should_failslab+0x9/0x20 [ 838.047849][T15113] kmem_cache_alloc+0x63/0x3b0 [ 838.052688][T15113] security_file_alloc+0x38/0x170 [ 838.057787][T15113] __alloc_file+0xd9/0x270 [ 838.062273][T15113] alloc_empty_file+0x71/0x190 [ 838.067148][T15113] path_openat+0xe6/0x2750 [ 838.071632][T15113] ? path_lookupat+0x840/0x840 [ 838.076462][T15113] do_filp_open+0x1ba/0x410 [ 838.081015][T15113] ? may_open_dev+0xf0/0xf0 [ 838.085572][T15113] ? find_held_lock+0x2d/0x110 [ 838.090411][T15113] ? alloc_fd+0x2e4/0x750 22:58:50 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) r6 = syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f0000000680)={&(0x7f00000005c0), &(0x7f0000000600)=""/95, 0x5f}) 22:58:50 executing program 5: bpf$MAP_CREATE(0x9, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 838.094817][T15113] ? do_raw_spin_lock+0x124/0x2b0 [ 838.099922][T15113] ? spin_bug+0x1c0/0x1c0 [ 838.104337][T15113] ? _raw_spin_unlock+0x28/0x40 [ 838.109276][T15113] ? alloc_fd+0x2e4/0x750 [ 838.113694][T15113] do_sys_openat2+0x16d/0x4c0 [ 838.118443][T15113] ? build_open_flags+0x720/0x720 [ 838.123550][T15113] __x64_sys_openat+0x143/0x1f0 [ 838.128461][T15113] ? __ia32_sys_open+0x1c0/0x1c0 [ 838.133449][T15113] ? ksys_write+0x1a3/0x250 [ 838.138007][T15113] ? syscall_enter_from_user_mode+0x26/0x80 [ 838.143972][T15113] do_syscall_64+0x39/0xb0 [ 838.148456][T15113] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 838.154431][T15113] RIP: 0033:0x7f954c23e284 [ 838.158897][T15113] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 838.178558][T15113] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 838.187025][T15113] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 22:58:50 executing program 5: bpf$MAP_CREATE(0xa, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 838.195042][T15113] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 838.203064][T15113] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 838.211082][T15113] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 838.219108][T15113] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 838.227158][T15113] [ 838.235550][T15118] CPU: 0 PID: 15118 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 838.245723][T15118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 838.255828][T15118] Call Trace: [ 838.259140][T15118] [ 838.262114][T15118] dump_stack_lvl+0x136/0x150 [ 838.266864][T15118] should_fail_ex+0x4a3/0x5b0 [ 838.271629][T15118] should_failslab+0x9/0x20 [ 838.276209][T15118] kmem_cache_alloc+0x63/0x3b0 [ 838.281049][T15118] security_file_alloc+0x38/0x170 [ 838.286151][T15118] __alloc_file+0xd9/0x270 [ 838.290655][T15118] alloc_empty_file+0x71/0x190 [ 838.295508][T15118] path_openat+0xe6/0x2750 [ 838.299989][T15118] ? trace_lock_acquire+0x12d/0x180 [ 838.305241][T15118] ? path_lookupat+0x840/0x840 [ 838.310066][T15118] do_filp_open+0x1ba/0x410 [ 838.314637][T15118] ? may_open_dev+0xf0/0xf0 [ 838.319211][T15118] ? find_held_lock+0x2d/0x110 [ 838.324004][T15118] ? alloc_fd+0x2e4/0x750 [ 838.328370][T15118] ? do_raw_spin_lock+0x124/0x2b0 [ 838.333457][T15118] ? spin_bug+0x1c0/0x1c0 [ 838.337859][T15118] ? _raw_spin_unlock+0x28/0x40 [ 838.342740][T15118] ? alloc_fd+0x2e4/0x750 [ 838.347110][T15118] do_sys_openat2+0x16d/0x4c0 [ 838.351815][T15118] ? build_open_flags+0x720/0x720 [ 838.357223][T15118] __x64_sys_openat+0x143/0x1f0 [ 838.362100][T15118] ? __ia32_sys_open+0x1c0/0x1c0 [ 838.367058][T15118] ? ksys_write+0x1a3/0x250 [ 838.371597][T15118] ? syscall_enter_from_user_mode+0x26/0x80 [ 838.377543][T15118] do_syscall_64+0x39/0xb0 [ 838.382003][T15118] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 838.388065][T15118] RIP: 0033:0x7f31e643e284 [ 838.392519][T15118] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 838.412150][T15118] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 838.420592][T15118] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 838.428579][T15118] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 838.436586][T15118] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 838.444595][T15118] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 838.452594][T15118] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 838.460609][T15118] 22:58:50 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 5) 22:58:50 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x6, &(0x7f0000000140)={r0}, 0x10) 22:58:50 executing program 5: bpf$MAP_CREATE(0xb, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:50 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 5) 22:58:50 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) syz_open_dev$usbmon(&(0x7f0000000580), 0xffffffffffff8000, 0x400000) 22:58:50 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:50 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x7, &(0x7f0000000140)={r0}, 0x10) 22:58:50 executing program 5: bpf$MAP_CREATE(0xc, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:50 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r5, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) getsockname$llc(r4, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:50 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:50 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x8, &(0x7f0000000140)={r0}, 0x10) [ 838.623256][T15141] FAULT_INJECTION: forcing a failure. [ 838.623256][T15141] name failslab, interval 1, probability 0, space 0, times 0 [ 838.640943][T15142] FAULT_INJECTION: forcing a failure. [ 838.640943][T15142] name failslab, interval 1, probability 0, space 0, times 0 [ 838.669286][T15142] CPU: 0 PID: 15142 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 838.679267][T15142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 838.689376][T15142] Call Trace: [ 838.692790][T15142] [ 838.695763][T15142] dump_stack_lvl+0x136/0x150 [ 838.700515][T15142] should_fail_ex+0x4a3/0x5b0 [ 838.705272][T15142] should_failslab+0x9/0x20 [ 838.709854][T15142] __kmem_cache_alloc_node+0x5b/0x320 [ 838.715292][T15142] ? tomoyo_realpath_from_path+0xc3/0x600 [ 838.721167][T15142] ? tomoyo_realpath_from_path+0xc3/0x600 [ 838.726953][T15142] __kmalloc+0x4e/0x190 [ 838.731181][T15142] ? rcu_is_watching+0x12/0xb0 [ 838.736102][T15142] tomoyo_realpath_from_path+0xc3/0x600 [ 838.741746][T15142] tomoyo_check_open_permission+0x29a/0x3a0 [ 838.747705][T15142] ? tomoyo_path_number_perm+0x570/0x570 [ 838.753415][T15142] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 838.759490][T15142] ? hook_path_unlink+0x520/0x520 [ 838.764626][T15142] ? lock_downgrade+0x690/0x690 [ 838.769543][T15142] ? spin_bug+0x1c0/0x1c0 [ 838.773938][T15142] tomoyo_file_open+0xa1/0xc0 [ 838.778679][T15142] security_file_open+0x49/0xb0 [ 838.783580][T15142] do_dentry_open+0x575/0x13f0 [ 838.788407][T15142] ? may_open+0x1f6/0x420 [ 838.792817][T15142] path_openat+0x1baa/0x2750 [ 838.797484][T15142] ? path_lookupat+0x840/0x840 [ 838.802310][T15142] do_filp_open+0x1ba/0x410 [ 838.806853][T15142] ? may_open_dev+0xf0/0xf0 [ 838.811391][T15142] ? find_held_lock+0x2d/0x110 [ 838.816217][T15142] ? do_raw_spin_lock+0x124/0x2b0 [ 838.821296][T15142] ? spin_bug+0x1c0/0x1c0 [ 838.825700][T15142] ? _raw_spin_unlock+0x28/0x40 [ 838.830611][T15142] ? alloc_fd+0x2e4/0x750 [ 838.835018][T15142] do_sys_openat2+0x16d/0x4c0 [ 838.839784][T15142] ? build_open_flags+0x720/0x720 [ 838.844878][T15142] __x64_sys_openat+0x143/0x1f0 [ 838.849782][T15142] ? __ia32_sys_open+0x1c0/0x1c0 [ 838.854764][T15142] ? ksys_write+0x1a3/0x250 [ 838.859322][T15142] ? syscall_enter_from_user_mode+0x26/0x80 [ 838.865294][T15142] do_syscall_64+0x39/0xb0 [ 838.869795][T15142] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 838.875772][T15142] RIP: 0033:0x7f954c23e284 [ 838.880231][T15142] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 838.900117][T15142] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 838.908698][T15142] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 838.916786][T15142] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 838.924786][T15142] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 838.932799][T15142] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 838.940810][T15142] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 838.948830][T15142] [ 838.951872][T15141] CPU: 1 PID: 15141 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 838.961916][T15141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 838.972033][T15141] Call Trace: [ 838.975415][T15141] [ 838.978365][T15141] dump_stack_lvl+0x136/0x150 [ 838.983084][T15141] should_fail_ex+0x4a3/0x5b0 [ 838.987805][T15141] should_failslab+0x9/0x20 [ 838.992350][T15141] __kmem_cache_alloc_node+0x5b/0x320 [ 838.997752][T15141] ? tomoyo_realpath_from_path+0xc3/0x600 [ 839.003518][T15141] ? tomoyo_realpath_from_path+0xc3/0x600 [ 839.009274][T15141] __kmalloc+0x4e/0x190 [ 839.013464][T15141] ? rcu_is_watching+0x12/0xb0 [ 839.018272][T15141] tomoyo_realpath_from_path+0xc3/0x600 [ 839.025077][T15141] tomoyo_check_open_permission+0x29a/0x3a0 [ 839.031001][T15141] ? tomoyo_path_number_perm+0x570/0x570 [ 839.036665][T15141] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 839.042706][T15141] ? hook_path_unlink+0x520/0x520 [ 839.047768][T15141] ? lock_downgrade+0x690/0x690 [ 839.052648][T15141] ? spin_bug+0x1c0/0x1c0 [ 839.057012][T15141] tomoyo_file_open+0xa1/0xc0 [ 839.061723][T15141] security_file_open+0x49/0xb0 [ 839.066634][T15141] do_dentry_open+0x575/0x13f0 [ 839.071424][T15141] ? may_open+0x1f6/0x420 [ 839.075795][T15141] path_openat+0x1baa/0x2750 [ 839.080422][T15141] ? path_lookupat+0x840/0x840 [ 839.085218][T15141] do_filp_open+0x1ba/0x410 [ 839.089749][T15141] ? may_open_dev+0xf0/0xf0 [ 839.094305][T15141] ? preempt_schedule_common+0x45/0xb0 [ 839.099890][T15141] ? preempt_schedule_thunk+0x1a/0x20 [ 839.105311][T15141] ? _raw_spin_unlock+0x3a/0x40 [ 839.110191][T15141] ? alloc_fd+0x2e4/0x750 [ 839.114564][T15141] do_sys_openat2+0x16d/0x4c0 [ 839.119276][T15141] ? build_open_flags+0x720/0x720 [ 839.124346][T15141] __x64_sys_openat+0x143/0x1f0 [ 839.129238][T15141] ? __ia32_sys_open+0x1c0/0x1c0 [ 839.134211][T15141] ? ksys_write+0x1a3/0x250 [ 839.138750][T15141] ? syscall_enter_from_user_mode+0x26/0x80 [ 839.144777][T15141] do_syscall_64+0x39/0xb0 [ 839.149223][T15141] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 839.155163][T15141] RIP: 0033:0x7f31e643e284 [ 839.159598][T15141] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 839.179225][T15141] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 839.187661][T15141] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 839.195650][T15141] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 839.203641][T15141] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 839.211645][T15141] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 22:58:51 executing program 5: bpf$MAP_CREATE(0xd, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:51 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) [ 839.219722][T15141] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 839.227731][T15141] [ 839.235426][T15142] ERROR: Out of memory at tomoyo_realpath_from_path. [ 839.235807][T15141] ERROR: Out of memory at tomoyo_realpath_from_path. 22:58:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 6) 22:58:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x9, &(0x7f0000000140)={r0}, 0x10) 22:58:51 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 6) 22:58:51 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) mknodat(r4, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x5) 22:58:51 executing program 5: bpf$MAP_CREATE(0xe, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:51 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0xa, &(0x7f0000000140)={r0}, 0x10) [ 839.395951][T15161] FAULT_INJECTION: forcing a failure. [ 839.395951][T15161] name failslab, interval 1, probability 0, space 0, times 0 [ 839.451211][T15161] CPU: 1 PID: 15161 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 839.461184][T15161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 839.471283][T15161] Call Trace: [ 839.474611][T15161] [ 839.477584][T15161] dump_stack_lvl+0x136/0x150 [ 839.482342][T15161] should_fail_ex+0x4a3/0x5b0 [ 839.487116][T15161] should_failslab+0x9/0x20 [ 839.491688][T15161] __kmem_cache_alloc_node+0x5b/0x320 [ 839.497128][T15161] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 839.502577][T15161] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 839.508004][T15161] __kmalloc+0x4e/0x190 [ 839.512228][T15161] ? __kmem_cache_alloc_node+0x1b0/0x320 [ 839.517945][T15161] tomoyo_encode2.part.0+0xe9/0x3a0 [ 839.523226][T15161] ? tomoyo_realpath_from_path+0xc3/0x600 [ 839.529028][T15161] ? rcu_is_watching+0x12/0xb0 [ 839.533873][T15161] tomoyo_encode+0x2c/0x50 [ 839.538368][T15161] tomoyo_realpath_from_path+0x185/0x600 [ 839.544099][T15161] tomoyo_check_open_permission+0x29a/0x3a0 [ 839.550102][T15161] ? tomoyo_path_number_perm+0x570/0x570 [ 839.555809][T15161] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 839.561906][T15161] ? hook_path_unlink+0x520/0x520 [ 839.567001][T15161] ? lock_downgrade+0x690/0x690 [ 839.571979][T15161] ? spin_bug+0x1c0/0x1c0 [ 839.576388][T15161] tomoyo_file_open+0xa1/0xc0 [ 839.581138][T15161] security_file_open+0x49/0xb0 [ 839.586088][T15161] do_dentry_open+0x575/0x13f0 [ 839.590926][T15161] ? may_open+0x1f6/0x420 [ 839.595339][T15161] path_openat+0x1baa/0x2750 [ 839.600009][T15161] ? path_lookupat+0x840/0x840 [ 839.604856][T15161] do_filp_open+0x1ba/0x410 [ 839.609418][T15161] ? may_open_dev+0xf0/0xf0 [ 839.614008][T15161] ? find_held_lock+0x2d/0x110 [ 839.618853][T15161] ? do_raw_spin_lock+0x124/0x2b0 [ 839.623953][T15161] ? spin_bug+0x1c0/0x1c0 [ 839.628372][T15161] ? _raw_spin_unlock+0x28/0x40 [ 839.633282][T15161] ? alloc_fd+0x2e4/0x750 [ 839.637685][T15161] do_sys_openat2+0x16d/0x4c0 [ 839.642595][T15161] ? build_open_flags+0x720/0x720 22:58:51 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/usbtouchscreen', 0x602000, 0x20) 22:58:51 executing program 5: bpf$MAP_CREATE(0xf, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:51 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0xb, &(0x7f0000000140)={r0}, 0x10) 22:58:51 executing program 5: bpf$MAP_CREATE(0x10, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 839.647701][T15161] __x64_sys_openat+0x143/0x1f0 [ 839.652641][T15161] ? __ia32_sys_open+0x1c0/0x1c0 [ 839.657651][T15161] ? ksys_write+0x1a3/0x250 [ 839.662264][T15161] ? syscall_enter_from_user_mode+0x26/0x80 [ 839.668246][T15161] do_syscall_64+0x39/0xb0 [ 839.672733][T15161] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 839.678731][T15161] RIP: 0033:0x7f954c23e284 [ 839.683192][T15161] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 839.702941][T15161] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 839.711433][T15161] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 839.719451][T15161] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 839.727477][T15161] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 839.735519][T15161] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 839.743533][T15161] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 839.749053][T15178] FAULT_INJECTION: forcing a failure. [ 839.749053][T15178] name failslab, interval 1, probability 0, space 0, times 0 [ 839.751550][T15161] [ 839.795403][T15161] ERROR: Out of memory at tomoyo_realpath_from_path. [ 839.814277][T15178] CPU: 0 PID: 15178 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 839.824246][T15178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 839.834346][T15178] Call Trace: [ 839.837752][T15178] [ 839.840741][T15178] dump_stack_lvl+0x136/0x150 22:58:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 7) 22:58:51 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) [ 839.845499][T15178] should_fail_ex+0x4a3/0x5b0 [ 839.850263][T15178] should_failslab+0x9/0x20 [ 839.853899][T15183] FAULT_INJECTION: forcing a failure. [ 839.853899][T15183] name failslab, interval 1, probability 0, space 0, times 0 [ 839.854820][T15178] __kmem_cache_alloc_node+0x5b/0x320 [ 839.854869][T15178] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 839.854918][T15178] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 839.883972][T15178] __kmalloc+0x4e/0x190 [ 839.888197][T15178] ? __kmem_cache_alloc_node+0x1b0/0x320 [ 839.893888][T15178] tomoyo_encode2.part.0+0xe9/0x3a0 [ 839.899135][T15178] ? tomoyo_realpath_from_path+0xc3/0x600 [ 839.904902][T15178] ? rcu_is_watching+0x12/0xb0 [ 839.909726][T15178] tomoyo_encode+0x2c/0x50 [ 839.914186][T15178] tomoyo_realpath_from_path+0x185/0x600 [ 839.919881][T15178] tomoyo_check_open_permission+0x29a/0x3a0 [ 839.925828][T15178] ? tomoyo_path_number_perm+0x570/0x570 [ 839.931500][T15178] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 839.937553][T15178] ? hook_path_unlink+0x520/0x520 [ 839.942619][T15178] ? lock_downgrade+0x690/0x690 [ 839.947510][T15178] ? spin_bug+0x1c0/0x1c0 [ 839.951881][T15178] tomoyo_file_open+0xa1/0xc0 [ 839.956597][T15178] security_file_open+0x49/0xb0 [ 839.961498][T15178] do_dentry_open+0x575/0x13f0 [ 839.966334][T15178] ? may_open+0x1f6/0x420 [ 839.970721][T15178] path_openat+0x1baa/0x2750 [ 839.975376][T15178] ? path_lookupat+0x840/0x840 [ 839.980183][T15178] do_filp_open+0x1ba/0x410 [ 839.984720][T15178] ? may_open_dev+0xf0/0xf0 [ 839.989254][T15178] ? find_held_lock+0x2d/0x110 [ 839.994061][T15178] ? do_raw_spin_lock+0x124/0x2b0 [ 839.999217][T15178] ? spin_bug+0x1c0/0x1c0 [ 840.003609][T15178] ? _raw_spin_unlock+0x28/0x40 [ 840.008486][T15178] ? alloc_fd+0x2e4/0x750 [ 840.012874][T15178] do_sys_openat2+0x16d/0x4c0 [ 840.017592][T15178] ? build_open_flags+0x720/0x720 [ 840.022662][T15178] __x64_sys_openat+0x143/0x1f0 [ 840.027546][T15178] ? __ia32_sys_open+0x1c0/0x1c0 [ 840.032517][T15178] ? ksys_write+0x1a3/0x250 [ 840.037067][T15178] ? syscall_enter_from_user_mode+0x26/0x80 [ 840.043023][T15178] do_syscall_64+0x39/0xb0 [ 840.047491][T15178] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 840.053434][T15178] RIP: 0033:0x7f31e643e284 [ 840.057882][T15178] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 840.077602][T15178] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 840.086046][T15178] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 840.094085][T15178] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 840.102093][T15178] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 840.110111][T15178] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 840.118112][T15178] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 840.126164][T15178] [ 840.139246][T15178] ERROR: Out of memory at tomoyo_realpath_from_path. [ 840.148319][T15183] CPU: 0 PID: 15183 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 840.158315][T15183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 840.168423][T15183] Call Trace: [ 840.171747][T15183] [ 840.174807][T15183] dump_stack_lvl+0x136/0x150 [ 840.179552][T15183] should_fail_ex+0x4a3/0x5b0 [ 840.184268][T15183] should_failslab+0x9/0x20 [ 840.188867][T15183] __kmem_cache_alloc_node+0x5b/0x320 [ 840.194322][T15183] ? mon_bin_open+0xe8/0x4a0 [ 840.199033][T15183] ? mon_bin_read+0x600/0x600 [ 840.203734][T15183] kmalloc_trace+0x26/0xe0 [ 840.208179][T15183] ? mon_bin_read+0x600/0x600 [ 840.212872][T15183] mon_bin_open+0xe8/0x4a0 [ 840.217335][T15183] ? mon_bin_read+0x600/0x600 [ 840.222034][T15183] chrdev_open+0x26a/0x770 [ 840.226476][T15183] ? __unregister_chrdev+0x110/0x110 [ 840.231876][T15183] ? fsnotify_perm.part.0+0x221/0x610 [ 840.237363][T15183] do_dentry_open+0x6cc/0x13f0 [ 840.242158][T15183] ? __unregister_chrdev+0x110/0x110 [ 840.247855][T15183] ? may_open+0x1f6/0x420 [ 840.252219][T15183] path_openat+0x1baa/0x2750 [ 840.256840][T15183] ? path_lookupat+0x840/0x840 [ 840.261835][T15183] do_filp_open+0x1ba/0x410 [ 840.266365][T15183] ? may_open_dev+0xf0/0xf0 [ 840.270903][T15183] ? find_held_lock+0x2d/0x110 [ 840.275696][T15183] ? do_raw_spin_lock+0x124/0x2b0 [ 840.280843][T15183] ? spin_bug+0x1c0/0x1c0 [ 840.285209][T15183] ? _raw_spin_unlock+0x28/0x40 [ 840.290111][T15183] ? alloc_fd+0x2e4/0x750 [ 840.294520][T15183] do_sys_openat2+0x16d/0x4c0 [ 840.299267][T15183] ? build_open_flags+0x720/0x720 [ 840.304350][T15183] __x64_sys_openat+0x143/0x1f0 [ 840.309225][T15183] ? __ia32_sys_open+0x1c0/0x1c0 [ 840.314186][T15183] ? ksys_write+0x1a3/0x250 [ 840.318719][T15183] ? syscall_enter_from_user_mode+0x26/0x80 [ 840.324650][T15183] do_syscall_64+0x39/0xb0 [ 840.329176][T15183] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 840.335119][T15183] RIP: 0033:0x7f954c23e284 [ 840.339562][T15183] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 840.359203][T15183] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 840.367634][T15183] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 840.375623][T15183] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 840.383610][T15183] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 22:58:52 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 7) 22:58:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0xc, &(0x7f0000000140)={r0}, 0x10) 22:58:52 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/class/regulator', 0x2000, 0x10) 22:58:52 executing program 5: bpf$MAP_CREATE(0x11, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:52 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 8) [ 840.393608][T15183] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 840.401639][T15183] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 840.409667][T15183] 22:58:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0xd, &(0x7f0000000140)={r0}, 0x10) 22:58:52 executing program 5: bpf$MAP_CREATE(0x12, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:52 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:52 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) faccessat(r3, &(0x7f0000000400)='./file1\x00', 0x2) [ 840.558067][T15196] FAULT_INJECTION: forcing a failure. [ 840.558067][T15196] name failslab, interval 1, probability 0, space 0, times 0 22:58:52 executing program 5: bpf$MAP_CREATE(0x13, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0xe, &(0x7f0000000140)={r0}, 0x10) [ 840.642843][T15196] CPU: 0 PID: 15196 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 840.652828][T15196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 840.662924][T15196] Call Trace: [ 840.666251][T15196] [ 840.669223][T15196] dump_stack_lvl+0x136/0x150 [ 840.673989][T15196] should_fail_ex+0x4a3/0x5b0 [ 840.678748][T15196] should_failslab+0x9/0x20 [ 840.683324][T15196] __kmem_cache_alloc_node+0x5b/0x320 [ 840.688886][T15196] ? mon_bin_open+0xe8/0x4a0 [ 840.693562][T15196] ? mon_bin_read+0x600/0x600 [ 840.698312][T15196] kmalloc_trace+0x26/0xe0 [ 840.702796][T15196] ? mon_bin_read+0x600/0x600 [ 840.707522][T15196] mon_bin_open+0xe8/0x4a0 [ 840.711979][T15196] ? mon_bin_read+0x600/0x600 [ 840.716691][T15196] chrdev_open+0x26a/0x770 [ 840.721141][T15196] ? __unregister_chrdev+0x110/0x110 [ 840.726460][T15196] ? fsnotify_perm.part.0+0x221/0x610 [ 840.731873][T15196] do_dentry_open+0x6cc/0x13f0 [ 840.736675][T15196] ? __unregister_chrdev+0x110/0x110 [ 840.741995][T15196] ? may_open+0x1f6/0x420 [ 840.746399][T15196] path_openat+0x1baa/0x2750 [ 840.751026][T15196] ? trace_lock_acquire+0x12d/0x180 [ 840.756266][T15196] ? path_lookupat+0x840/0x840 [ 840.761083][T15196] do_filp_open+0x1ba/0x410 [ 840.765613][T15196] ? may_open_dev+0xf0/0xf0 [ 840.770142][T15196] ? find_held_lock+0x2d/0x110 [ 840.774973][T15196] ? do_raw_spin_lock+0x124/0x2b0 [ 840.780044][T15196] ? spin_bug+0x1c0/0x1c0 [ 840.784421][T15196] ? _raw_spin_unlock+0x28/0x40 [ 840.789307][T15196] ? alloc_fd+0x2e4/0x750 [ 840.793702][T15196] do_sys_openat2+0x16d/0x4c0 [ 840.798431][T15196] ? build_open_flags+0x720/0x720 [ 840.803506][T15196] __x64_sys_openat+0x143/0x1f0 [ 840.808479][T15196] ? __ia32_sys_open+0x1c0/0x1c0 [ 840.813450][T15196] ? ksys_write+0x1a3/0x250 [ 840.817998][T15196] ? syscall_enter_from_user_mode+0x26/0x80 [ 840.823948][T15196] do_syscall_64+0x39/0xb0 [ 840.828398][T15196] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 840.834340][T15196] RIP: 0033:0x7f31e643e284 [ 840.838780][T15196] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 840.858427][T15196] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 840.866956][T15196] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 840.874958][T15196] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 840.882967][T15196] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 840.890962][T15196] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 840.898984][T15196] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 840.906994][T15196] [ 840.920839][T15197] FAULT_INJECTION: forcing a failure. [ 840.920839][T15197] name failslab, interval 1, probability 0, space 0, times 0 [ 840.986692][T15197] CPU: 1 PID: 15197 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 840.996756][T15197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 841.006971][T15197] Call Trace: [ 841.010290][T15197] [ 841.013277][T15197] dump_stack_lvl+0x136/0x150 [ 841.018012][T15197] should_fail_ex+0x4a3/0x5b0 [ 841.022740][T15197] should_failslab+0x9/0x20 [ 841.027296][T15197] __kmem_cache_alloc_node+0x5b/0x320 [ 841.032710][T15197] ? mon_bin_open+0x1aa/0x4a0 [ 841.037444][T15197] ? lockdep_init_map_type+0x21e/0x810 [ 841.042936][T15197] kmalloc_trace+0x26/0xe0 [ 841.047382][T15197] mon_bin_open+0x1aa/0x4a0 [ 841.051927][T15197] ? mon_bin_read+0x600/0x600 [ 841.056656][T15197] chrdev_open+0x26a/0x770 [ 841.061105][T15197] ? __unregister_chrdev+0x110/0x110 [ 841.066459][T15197] ? fsnotify_perm.part.0+0x221/0x610 [ 841.071868][T15197] do_dentry_open+0x6cc/0x13f0 [ 841.076685][T15197] ? __unregister_chrdev+0x110/0x110 [ 841.081999][T15197] ? may_open+0x1f6/0x420 [ 841.086375][T15197] path_openat+0x1baa/0x2750 [ 841.091011][T15197] ? trace_lock_acquire+0x12d/0x180 [ 841.096259][T15197] ? path_lookupat+0x840/0x840 [ 841.101068][T15197] do_filp_open+0x1ba/0x410 [ 841.105636][T15197] ? may_open_dev+0xf0/0xf0 [ 841.110170][T15197] ? find_held_lock+0x2d/0x110 [ 841.114975][T15197] ? do_raw_spin_lock+0x124/0x2b0 [ 841.120044][T15197] ? spin_bug+0x1c0/0x1c0 [ 841.124506][T15197] ? _raw_spin_unlock+0x28/0x40 [ 841.129390][T15197] ? alloc_fd+0x2e4/0x750 [ 841.133763][T15197] do_sys_openat2+0x16d/0x4c0 [ 841.138484][T15197] ? build_open_flags+0x720/0x720 [ 841.143591][T15197] __x64_sys_openat+0x143/0x1f0 [ 841.148477][T15197] ? __ia32_sys_open+0x1c0/0x1c0 [ 841.153445][T15197] ? ksys_write+0x1a3/0x250 [ 841.158079][T15197] ? syscall_enter_from_user_mode+0x26/0x80 [ 841.164025][T15197] do_syscall_64+0x39/0xb0 [ 841.168491][T15197] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 841.174609][T15197] RIP: 0033:0x7f954c23e284 [ 841.179048][T15197] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 841.198696][T15197] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 841.207133][T15197] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 841.215125][T15197] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 841.223132][T15197] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 22:58:53 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 9) 22:58:53 executing program 5: bpf$MAP_CREATE(0x14, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:53 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 8) 22:58:53 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0xf, &(0x7f0000000140)={r0}, 0x10) 22:58:53 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:53 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/dm_mod', 0x1000, 0x0) [ 841.231140][T15197] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 841.239135][T15197] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 841.247146][T15197] 22:58:53 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:53 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) syz_open_dev$ndb(&(0x7f0000000380), 0x0, 0xa0000) 22:58:53 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x10, &(0x7f0000000140)={r0}, 0x10) 22:58:53 executing program 5: bpf$MAP_CREATE(0x15, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 841.353393][T15221] FAULT_INJECTION: forcing a failure. [ 841.353393][T15221] name failslab, interval 1, probability 0, space 0, times 0 22:58:53 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) [ 841.418617][T15221] CPU: 0 PID: 15221 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 841.428855][T15221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 841.438966][T15221] Call Trace: [ 841.442293][T15221] [ 841.445274][T15221] dump_stack_lvl+0x136/0x150 [ 841.450049][T15221] should_fail_ex+0x4a3/0x5b0 [ 841.454818][T15221] should_failslab+0x9/0x20 [ 841.459412][T15221] __kmem_cache_alloc_node+0x5b/0x320 [ 841.464871][T15221] ? mon_bin_open+0x1aa/0x4a0 [ 841.469613][T15221] ? lockdep_init_map_type+0x21e/0x810 [ 841.475150][T15221] kmalloc_trace+0x26/0xe0 [ 841.479642][T15221] mon_bin_open+0x1aa/0x4a0 [ 841.484208][T15221] ? mon_bin_read+0x600/0x600 [ 841.488948][T15221] chrdev_open+0x26a/0x770 [ 841.493432][T15221] ? __unregister_chrdev+0x110/0x110 [ 841.498785][T15221] ? fsnotify_perm.part.0+0x221/0x610 [ 841.504234][T15221] do_dentry_open+0x6cc/0x13f0 [ 841.509061][T15221] ? __unregister_chrdev+0x110/0x110 [ 841.514412][T15221] ? may_open+0x1f6/0x420 [ 841.518796][T15221] path_openat+0x1baa/0x2750 [ 841.523458][T15221] ? trace_lock_acquire+0x12d/0x180 [ 841.528694][T15221] ? path_lookupat+0x840/0x840 [ 841.533497][T15221] do_filp_open+0x1ba/0x410 [ 841.538032][T15221] ? may_open_dev+0xf0/0xf0 [ 841.542568][T15221] ? find_held_lock+0x2d/0x110 [ 841.547368][T15221] ? do_raw_spin_lock+0x124/0x2b0 [ 841.552521][T15221] ? spin_bug+0x1c0/0x1c0 [ 841.556923][T15221] ? _raw_spin_unlock+0x28/0x40 [ 841.561814][T15221] ? alloc_fd+0x2e4/0x750 [ 841.566331][T15221] do_sys_openat2+0x16d/0x4c0 [ 841.571107][T15221] ? build_open_flags+0x720/0x720 [ 841.576189][T15221] __x64_sys_openat+0x143/0x1f0 [ 841.581168][T15221] ? __ia32_sys_open+0x1c0/0x1c0 [ 841.586155][T15221] ? ksys_write+0x1a3/0x250 [ 841.590704][T15221] ? syscall_enter_from_user_mode+0x26/0x80 [ 841.596651][T15221] do_syscall_64+0x39/0xb0 [ 841.601100][T15221] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 841.607061][T15221] RIP: 0033:0x7f31e643e284 [ 841.611591][T15221] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 841.631228][T15221] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 841.639670][T15221] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 841.647662][T15221] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 841.655656][T15221] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 22:58:53 executing program 5: bpf$MAP_CREATE(0x16, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 841.663649][T15221] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 841.671639][T15221] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 841.679652][T15221] [ 841.696894][T15222] FAULT_INJECTION: forcing a failure. [ 841.696894][T15222] name fail_page_alloc, interval 1, probability 0, space 0, times 1 22:58:53 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 9) [ 841.779127][T15222] CPU: 1 PID: 15222 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 841.789110][T15222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 841.799217][T15222] Call Trace: [ 841.802566][T15222] [ 841.805545][T15222] dump_stack_lvl+0x136/0x150 [ 841.810301][T15222] should_fail_ex+0x4a3/0x5b0 [ 841.815064][T15222] prepare_alloc_pages+0x178/0x570 [ 841.820327][T15222] __alloc_pages+0x149/0x4a0 [ 841.825050][T15222] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 841.831917][T15222] ? asm_exc_int3+0x39/0x40 [ 841.836491][T15222] ? __kmem_cache_alloc_node+0x213/0x320 [ 841.842199][T15222] alloc_pages+0x1aa/0x270 [ 841.846742][T15222] get_zeroed_page+0x14/0x40 [ 841.851406][T15222] mon_alloc_buff+0xbc/0x180 [ 841.856569][T15222] ? kasan_set_track+0x25/0x30 [ 841.861402][T15222] mon_bin_open+0x209/0x4a0 [ 841.865970][T15222] ? mon_bin_read+0x600/0x600 [ 841.870707][T15222] chrdev_open+0x26a/0x770 [ 841.875193][T15222] ? __unregister_chrdev+0x110/0x110 [ 841.880543][T15222] ? fsnotify_perm.part.0+0x221/0x610 [ 841.885988][T15222] do_dentry_open+0x6cc/0x13f0 [ 841.890812][T15222] ? __unregister_chrdev+0x110/0x110 [ 841.896136][T15222] ? may_open+0x1f6/0x420 [ 841.900516][T15222] path_openat+0x1baa/0x2750 [ 841.905145][T15222] ? path_lookupat+0x840/0x840 [ 841.909970][T15222] do_filp_open+0x1ba/0x410 [ 841.914517][T15222] ? may_open_dev+0xf0/0xf0 [ 841.919065][T15222] ? find_held_lock+0x2d/0x110 [ 841.923884][T15222] ? do_raw_spin_lock+0x124/0x2b0 [ 841.928951][T15222] ? spin_bug+0x1c0/0x1c0 [ 841.933334][T15222] ? _raw_spin_unlock+0x28/0x40 [ 841.938220][T15222] ? alloc_fd+0x2e4/0x750 [ 841.942601][T15222] do_sys_openat2+0x16d/0x4c0 [ 841.947329][T15222] ? build_open_flags+0x720/0x720 [ 841.952408][T15222] __x64_sys_openat+0x143/0x1f0 [ 841.957292][T15222] ? __ia32_sys_open+0x1c0/0x1c0 [ 841.962273][T15222] ? ksys_write+0x1a3/0x250 [ 841.966814][T15222] ? syscall_enter_from_user_mode+0x26/0x80 [ 841.972755][T15222] do_syscall_64+0x39/0xb0 [ 841.977201][T15222] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 841.983139][T15222] RIP: 0033:0x7f954c23e284 [ 841.987580][T15222] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 842.007213][T15222] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 842.015669][T15222] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 842.024098][T15222] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 842.032099][T15222] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 842.040092][T15222] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 842.048083][T15222] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 842.056099][T15222] 22:58:54 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 10) 22:58:54 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) 22:58:54 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:54 executing program 5: bpf$MAP_CREATE(0x17, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x11, &(0x7f0000000140)={r0}, 0x10) [ 842.088644][T15238] FAULT_INJECTION: forcing a failure. [ 842.088644][T15238] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 842.110542][T15238] CPU: 1 PID: 15238 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 842.120511][T15238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 842.130615][T15238] Call Trace: [ 842.133952][T15238] 22:58:54 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) [ 842.136922][T15238] dump_stack_lvl+0x136/0x150 [ 842.141680][T15238] should_fail_ex+0x4a3/0x5b0 [ 842.146442][T15238] prepare_alloc_pages+0x178/0x570 [ 842.151672][T15238] ? ___slab_alloc+0xca0/0x1400 [ 842.156593][T15238] __alloc_pages+0x149/0x4a0 [ 842.161264][T15238] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 842.168135][T15238] alloc_pages+0x1aa/0x270 [ 842.172622][T15238] get_zeroed_page+0x14/0x40 [ 842.177274][T15238] mon_alloc_buff+0xbc/0x180 [ 842.181929][T15238] ? kasan_set_track+0x25/0x30 [ 842.186775][T15238] mon_bin_open+0x209/0x4a0 [ 842.191356][T15238] ? mon_bin_read+0x600/0x600 [ 842.196103][T15238] chrdev_open+0x26a/0x770 [ 842.200616][T15238] ? __unregister_chrdev+0x110/0x110 [ 842.205971][T15238] ? fsnotify_perm.part.0+0x221/0x610 [ 842.211429][T15238] do_dentry_open+0x6cc/0x13f0 [ 842.216260][T15238] ? __unregister_chrdev+0x110/0x110 [ 842.221622][T15238] ? may_open+0x1f6/0x420 [ 842.226041][T15238] path_openat+0x1baa/0x2750 [ 842.230703][T15238] ? trace_lock_acquire+0x12d/0x180 [ 842.236002][T15238] ? path_lookupat+0x840/0x840 [ 842.240839][T15238] do_filp_open+0x1ba/0x410 [ 842.245403][T15238] ? may_open_dev+0xf0/0xf0 [ 842.249963][T15238] ? find_held_lock+0x2d/0x110 [ 842.254802][T15238] ? do_raw_spin_lock+0x124/0x2b0 [ 842.259900][T15238] ? spin_bug+0x1c0/0x1c0 [ 842.264306][T15238] ? _raw_spin_unlock+0x28/0x40 [ 842.269249][T15238] ? alloc_fd+0x2e4/0x750 [ 842.273707][T15238] do_sys_openat2+0x16d/0x4c0 [ 842.278457][T15238] ? build_open_flags+0x720/0x720 [ 842.283745][T15238] __x64_sys_openat+0x143/0x1f0 22:58:54 executing program 3: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) [ 842.288668][T15238] ? __ia32_sys_open+0x1c0/0x1c0 [ 842.293691][T15238] ? ksys_write+0x1a3/0x250 [ 842.298268][T15238] ? syscall_enter_from_user_mode+0x26/0x80 [ 842.304250][T15238] do_syscall_64+0x39/0xb0 [ 842.308826][T15238] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 842.314807][T15238] RIP: 0033:0x7f31e643e284 [ 842.319269][T15238] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 842.338943][T15238] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 842.347422][T15238] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 842.355448][T15238] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 842.363468][T15238] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 842.371498][T15238] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 842.379516][T15238] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 22:58:54 executing program 5: bpf$MAP_CREATE(0x18, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 842.387556][T15238] [ 842.409319][T15240] FAULT_INJECTION: forcing a failure. [ 842.409319][T15240] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 842.439665][T15240] CPU: 1 PID: 15240 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 842.449641][T15240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 842.459747][T15240] Call Trace: [ 842.463074][T15240] [ 842.466039][T15240] dump_stack_lvl+0x136/0x150 [ 842.470801][T15240] should_fail_ex+0x4a3/0x5b0 [ 842.475561][T15240] prepare_alloc_pages+0x178/0x570 [ 842.480802][T15240] __alloc_pages+0x149/0x4a0 [ 842.485472][T15240] ? find_held_lock+0x2d/0x110 [ 842.490324][T15240] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 842.497205][T15240] alloc_pages+0x1aa/0x270 [ 842.501703][T15240] get_zeroed_page+0x14/0x40 [ 842.506340][T15240] mon_alloc_buff+0xbc/0x180 [ 842.510968][T15240] ? kasan_set_track+0x25/0x30 [ 842.515784][T15240] mon_bin_open+0x209/0x4a0 [ 842.520403][T15240] ? mon_bin_read+0x600/0x600 [ 842.525166][T15240] chrdev_open+0x26a/0x770 [ 842.529633][T15240] ? __unregister_chrdev+0x110/0x110 [ 842.534959][T15240] ? fsnotify_perm.part.0+0x221/0x610 [ 842.540383][T15240] do_dentry_open+0x6cc/0x13f0 [ 842.545211][T15240] ? __unregister_chrdev+0x110/0x110 [ 842.550537][T15240] ? may_open+0x1f6/0x420 [ 842.555023][T15240] path_openat+0x1baa/0x2750 [ 842.559656][T15240] ? trace_lock_acquire+0x12d/0x180 [ 842.564890][T15240] ? path_lookupat+0x840/0x840 [ 842.569696][T15240] do_filp_open+0x1ba/0x410 [ 842.574235][T15240] ? may_open_dev+0xf0/0xf0 [ 842.578772][T15240] ? find_held_lock+0x2d/0x110 [ 842.583686][T15240] ? do_raw_spin_lock+0x124/0x2b0 [ 842.588751][T15240] ? spin_bug+0x1c0/0x1c0 [ 842.593132][T15240] ? _raw_spin_unlock+0x28/0x40 [ 842.598014][T15240] ? alloc_fd+0x2e4/0x750 [ 842.602649][T15240] do_sys_openat2+0x16d/0x4c0 [ 842.607366][T15240] ? build_open_flags+0x720/0x720 [ 842.612436][T15240] __x64_sys_openat+0x143/0x1f0 [ 842.617323][T15240] ? __ia32_sys_open+0x1c0/0x1c0 [ 842.622313][T15240] ? ksys_write+0x1a3/0x250 [ 842.626862][T15240] ? syscall_enter_from_user_mode+0x26/0x80 [ 842.632823][T15240] do_syscall_64+0x39/0xb0 [ 842.637275][T15240] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 842.643216][T15240] RIP: 0033:0x7f954c23e284 [ 842.647668][T15240] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 842.667351][T15240] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 842.675809][T15240] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 22:58:54 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 10) 22:58:54 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:54 executing program 3: getsockname$llc(0xffffffffffffffff, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000540)=0x10) [ 842.683808][T15240] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 842.691888][T15240] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 842.699970][T15240] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 842.707960][T15240] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 842.715976][T15240] 22:58:54 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 11) 22:58:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x12, &(0x7f0000000140)={r0}, 0x10) 22:58:54 executing program 5: bpf$MAP_CREATE(0x19, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:54 executing program 3: getsockname$llc(0xffffffffffffffff, 0x0, &(0x7f0000000540)) 22:58:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x13, &(0x7f0000000140)={r0}, 0x10) 22:58:54 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00', 0x1) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) [ 842.856901][T15261] FAULT_INJECTION: forcing a failure. [ 842.856901][T15261] name fail_page_alloc, interval 1, probability 0, space 0, times 0 22:58:54 executing program 3: getsockname$llc(0xffffffffffffffff, 0x0, 0x0) [ 842.910056][T15261] CPU: 1 PID: 15261 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 842.920038][T15261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 842.930148][T15261] Call Trace: [ 842.933468][T15261] [ 842.936441][T15261] dump_stack_lvl+0x136/0x150 [ 842.941192][T15261] should_fail_ex+0x4a3/0x5b0 [ 842.945954][T15261] prepare_alloc_pages+0x178/0x570 [ 842.951146][T15261] __alloc_pages+0x149/0x4a0 [ 842.955829][T15261] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 842.962692][T15261] alloc_pages+0x1aa/0x270 [ 842.967204][T15261] get_zeroed_page+0x14/0x40 [ 842.971853][T15261] mon_alloc_buff+0xbc/0x180 [ 842.976503][T15261] ? kasan_set_track+0x25/0x30 [ 842.981350][T15261] mon_bin_open+0x209/0x4a0 [ 842.985927][T15261] ? mon_bin_read+0x600/0x600 [ 842.990670][T15261] chrdev_open+0x26a/0x770 [ 842.995148][T15261] ? __unregister_chrdev+0x110/0x110 [ 843.000497][T15261] ? fsnotify_perm.part.0+0x221/0x610 [ 843.005948][T15261] do_dentry_open+0x6cc/0x13f0 [ 843.010801][T15261] ? __unregister_chrdev+0x110/0x110 [ 843.016166][T15261] ? may_open+0x1f6/0x420 [ 843.020617][T15261] path_openat+0x1baa/0x2750 [ 843.025312][T15261] ? path_lookupat+0x840/0x840 [ 843.030149][T15261] do_filp_open+0x1ba/0x410 [ 843.034715][T15261] ? may_open_dev+0xf0/0xf0 [ 843.039281][T15261] ? find_held_lock+0x2d/0x110 [ 843.050809][T15261] ? do_raw_spin_lock+0x124/0x2b0 [ 843.055907][T15261] ? spin_bug+0x1c0/0x1c0 22:58:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x12, &(0x7f0000000140)={r0}, 0x10) [ 843.060347][T15261] ? _raw_spin_unlock+0x28/0x40 [ 843.065252][T15261] ? alloc_fd+0x2e4/0x750 [ 843.069684][T15261] do_sys_openat2+0x16d/0x4c0 [ 843.074431][T15261] ? build_open_flags+0x720/0x720 [ 843.079538][T15261] __x64_sys_openat+0x143/0x1f0 [ 843.084454][T15261] ? __ia32_sys_open+0x1c0/0x1c0 [ 843.089453][T15261] ? ksys_write+0x1a3/0x250 [ 843.094030][T15261] ? syscall_enter_from_user_mode+0x26/0x80 [ 843.100007][T15261] do_syscall_64+0x39/0xb0 [ 843.104489][T15261] entry_SYSCALL_64_after_hwframe+0x63/0xcd 22:58:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x12, &(0x7f0000000140)={r0}, 0x10) [ 843.110991][T15261] RIP: 0033:0x7f31e643e284 [ 843.115455][T15261] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 843.135204][T15261] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 843.143712][T15261] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 843.151773][T15261] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 843.159799][T15261] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 843.167823][T15261] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 843.175847][T15261] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 843.183893][T15261] [ 843.229972][T15264] FAULT_INJECTION: forcing a failure. [ 843.229972][T15264] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 843.266787][T15264] CPU: 1 PID: 15264 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 22:58:55 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 11) 22:58:55 executing program 5: bpf$MAP_CREATE(0x1a, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x14, &(0x7f0000000140)={r0}, 0x10) [ 843.276768][T15264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 843.286873][T15264] Call Trace: [ 843.290193][T15264] [ 843.293197][T15264] dump_stack_lvl+0x136/0x150 [ 843.297959][T15264] should_fail_ex+0x4a3/0x5b0 [ 843.302731][T15264] prepare_alloc_pages+0x178/0x570 [ 843.307920][T15264] __alloc_pages+0x149/0x4a0 [ 843.312607][T15264] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 843.319448][T15264] alloc_pages+0x1aa/0x270 [ 843.323902][T15264] get_zeroed_page+0x14/0x40 [ 843.328564][T15264] mon_alloc_buff+0xbc/0x180 [ 843.333202][T15264] ? kasan_set_track+0x25/0x30 [ 843.338031][T15264] mon_bin_open+0x209/0x4a0 [ 843.342570][T15264] ? mon_bin_read+0x600/0x600 [ 843.347282][T15264] chrdev_open+0x26a/0x770 [ 843.351735][T15264] ? __unregister_chrdev+0x110/0x110 [ 843.357073][T15264] ? fsnotify_perm.part.0+0x221/0x610 [ 843.362510][T15264] do_dentry_open+0x6cc/0x13f0 [ 843.367318][T15264] ? __unregister_chrdev+0x110/0x110 [ 843.372644][T15264] ? may_open+0x1f6/0x420 [ 843.377077][T15264] path_openat+0x1baa/0x2750 [ 843.381715][T15264] ? trace_lock_acquire+0x12d/0x180 [ 843.386953][T15264] ? path_lookupat+0x840/0x840 [ 843.391773][T15264] do_filp_open+0x1ba/0x410 [ 843.396335][T15264] ? may_open_dev+0xf0/0xf0 [ 843.400874][T15264] ? find_held_lock+0x2d/0x110 [ 843.405787][T15264] ? do_raw_spin_lock+0x124/0x2b0 [ 843.410862][T15264] ? spin_bug+0x1c0/0x1c0 [ 843.415239][T15264] ? _raw_spin_unlock+0x28/0x40 [ 843.420137][T15264] ? alloc_fd+0x2e4/0x750 [ 843.424598][T15264] do_sys_openat2+0x16d/0x4c0 [ 843.429341][T15264] ? build_open_flags+0x720/0x720 [ 843.434419][T15264] __x64_sys_openat+0x143/0x1f0 [ 843.439302][T15264] ? __ia32_sys_open+0x1c0/0x1c0 [ 843.444278][T15264] ? ksys_write+0x1a3/0x250 [ 843.448825][T15264] ? syscall_enter_from_user_mode+0x26/0x80 [ 843.454861][T15264] do_syscall_64+0x39/0xb0 [ 843.459327][T15264] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 843.465275][T15264] RIP: 0033:0x7f954c23e284 [ 843.469714][T15264] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 843.489364][T15264] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 843.497814][T15264] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 843.505813][T15264] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 843.513814][T15264] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 843.521906][T15264] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 843.530081][T15264] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 843.538550][T15264] [ 843.603817][T15285] FAULT_INJECTION: forcing a failure. [ 843.603817][T15285] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 843.617718][T15285] CPU: 0 PID: 15285 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 843.627674][T15285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 843.637813][T15285] Call Trace: [ 843.641151][T15285] [ 843.644134][T15285] dump_stack_lvl+0x136/0x150 [ 843.648903][T15285] should_fail_ex+0x4a3/0x5b0 22:58:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 12) 22:58:55 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x12, &(0x7f0000000140)={r0}, 0x10) 22:58:55 executing program 5: bpf$MAP_CREATE(0x1b, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x15, &(0x7f0000000140)={r0}, 0x10) 22:58:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x16, &(0x7f0000000140)={r0}, 0x10) [ 843.653700][T15285] prepare_alloc_pages+0x178/0x570 [ 843.658912][T15285] __alloc_pages+0x149/0x4a0 [ 843.663579][T15285] ? find_held_lock+0x2d/0x110 [ 843.668406][T15285] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 843.675269][T15285] alloc_pages+0x1aa/0x270 [ 843.679757][T15285] get_zeroed_page+0x14/0x40 [ 843.684417][T15285] mon_alloc_buff+0xbc/0x180 [ 843.689077][T15285] ? kasan_set_track+0x25/0x30 [ 843.693923][T15285] mon_bin_open+0x209/0x4a0 [ 843.698496][T15285] ? mon_bin_read+0x600/0x600 22:58:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x17, &(0x7f0000000140)={r0}, 0x10) [ 843.703331][T15285] chrdev_open+0x26a/0x770 [ 843.707816][T15285] ? __unregister_chrdev+0x110/0x110 [ 843.713190][T15285] ? fsnotify_perm.part.0+0x221/0x610 [ 843.718654][T15285] do_dentry_open+0x6cc/0x13f0 [ 843.723491][T15285] ? __unregister_chrdev+0x110/0x110 [ 843.728839][T15285] ? may_open+0x1f6/0x420 [ 843.733260][T15285] path_openat+0x1baa/0x2750 [ 843.737926][T15285] ? path_lookupat+0x840/0x840 [ 843.742771][T15285] do_filp_open+0x1ba/0x410 [ 843.747342][T15285] ? may_open_dev+0xf0/0xf0 22:58:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x18, &(0x7f0000000140)={r0}, 0x10) [ 843.751909][T15285] ? find_held_lock+0x2d/0x110 [ 843.756751][T15285] ? do_raw_spin_lock+0x124/0x2b0 [ 843.761887][T15285] ? spin_bug+0x1c0/0x1c0 [ 843.766300][T15285] ? _raw_spin_unlock+0x28/0x40 [ 843.771216][T15285] ? alloc_fd+0x2e4/0x750 [ 843.775619][T15285] do_sys_openat2+0x16d/0x4c0 [ 843.780363][T15285] ? build_open_flags+0x720/0x720 [ 843.785498][T15285] __x64_sys_openat+0x143/0x1f0 [ 843.790416][T15285] ? __ia32_sys_open+0x1c0/0x1c0 [ 843.795422][T15285] ? ksys_write+0x1a3/0x250 22:58:55 executing program 5: bpf$MAP_CREATE(0x1c, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 843.800009][T15285] ? syscall_enter_from_user_mode+0x26/0x80 [ 843.806000][T15285] do_syscall_64+0x39/0xb0 [ 843.810496][T15285] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 843.816471][T15285] RIP: 0033:0x7f31e643e284 [ 843.820938][T15285] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 843.840610][T15285] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 843.849088][T15285] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 843.857111][T15285] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 843.865134][T15285] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 843.873163][T15285] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 843.881193][T15285] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 843.889246][T15285] [ 843.927897][T15292] FAULT_INJECTION: forcing a failure. [ 843.927897][T15292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 843.941520][T15292] CPU: 0 PID: 15292 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 843.951481][T15292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 843.961613][T15292] Call Trace: [ 843.964953][T15292] [ 843.967928][T15292] dump_stack_lvl+0x136/0x150 [ 843.972685][T15292] should_fail_ex+0x4a3/0x5b0 22:58:55 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 12) 22:58:55 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x12, &(0x7f0000000140), 0x10) 22:58:55 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) [ 843.977441][T15292] prepare_alloc_pages+0x178/0x570 [ 843.982636][T15292] __alloc_pages+0x149/0x4a0 [ 843.987297][T15292] ? find_held_lock+0x2d/0x110 [ 843.992127][T15292] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 843.999001][T15292] alloc_pages+0x1aa/0x270 [ 844.003490][T15292] get_zeroed_page+0x14/0x40 [ 844.008121][T15292] mon_alloc_buff+0xbc/0x180 [ 844.012745][T15292] ? kasan_set_track+0x25/0x30 [ 844.017548][T15292] mon_bin_open+0x209/0x4a0 [ 844.022085][T15292] ? mon_bin_read+0x600/0x600 [ 844.026796][T15292] chrdev_open+0x26a/0x770 [ 844.031245][T15292] ? __unregister_chrdev+0x110/0x110 [ 844.036562][T15292] ? fsnotify_perm.part.0+0x221/0x610 [ 844.041984][T15292] do_dentry_open+0x6cc/0x13f0 [ 844.046780][T15292] ? __unregister_chrdev+0x110/0x110 [ 844.052114][T15292] ? may_open+0x1f6/0x420 [ 844.056500][T15292] path_openat+0x1baa/0x2750 [ 844.061140][T15292] ? path_lookupat+0x840/0x840 [ 844.065958][T15292] do_filp_open+0x1ba/0x410 [ 844.070530][T15292] ? may_open_dev+0xf0/0xf0 [ 844.075062][T15292] ? find_held_lock+0x2d/0x110 [ 844.079866][T15292] ? do_raw_spin_lock+0x124/0x2b0 [ 844.084929][T15292] ? spin_bug+0x1c0/0x1c0 [ 844.089302][T15292] ? _raw_spin_unlock+0x28/0x40 [ 844.094184][T15292] ? alloc_fd+0x2e4/0x750 [ 844.098561][T15292] do_sys_openat2+0x16d/0x4c0 [ 844.103272][T15292] ? build_open_flags+0x720/0x720 [ 844.108340][T15292] __x64_sys_openat+0x143/0x1f0 [ 844.113228][T15292] ? __ia32_sys_open+0x1c0/0x1c0 [ 844.118197][T15292] ? ksys_write+0x1a3/0x250 [ 844.122751][T15292] ? syscall_enter_from_user_mode+0x26/0x80 [ 844.128691][T15292] do_syscall_64+0x39/0xb0 [ 844.133153][T15292] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 844.139090][T15292] RIP: 0033:0x7f954c23e284 [ 844.143540][T15292] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 844.163278][T15292] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 844.171715][T15292] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 844.179701][T15292] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 844.187700][T15292] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 844.195700][T15292] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 844.203701][T15292] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 844.211712][T15292] 22:58:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 13) 22:58:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x19, &(0x7f0000000140)={r0}, 0x10) 22:58:56 executing program 5: bpf$MAP_CREATE(0x1d, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:56 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:56 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x12, 0x0, 0x0) 22:58:56 executing program 5: bpf$MAP_CREATE(0x1e, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1a, &(0x7f0000000140)={r0}, 0x10) [ 844.321964][T15314] FAULT_INJECTION: forcing a failure. [ 844.321964][T15314] name fail_page_alloc, interval 1, probability 0, space 0, times 0 22:58:56 executing program 5: bpf$MAP_CREATE(0x21, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1b, &(0x7f0000000140)={r0}, 0x10) [ 844.381410][T15314] CPU: 0 PID: 15314 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 844.391386][T15314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 844.401506][T15314] Call Trace: [ 844.404833][T15314] [ 844.407820][T15314] dump_stack_lvl+0x136/0x150 [ 844.412647][T15314] should_fail_ex+0x4a3/0x5b0 [ 844.417409][T15314] prepare_alloc_pages+0x178/0x570 [ 844.422601][T15314] __alloc_pages+0x149/0x4a0 [ 844.427268][T15314] ? find_held_lock+0x2d/0x110 [ 844.432093][T15314] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 844.438999][T15314] alloc_pages+0x1aa/0x270 [ 844.443484][T15314] get_zeroed_page+0x14/0x40 [ 844.448155][T15314] mon_alloc_buff+0xbc/0x180 [ 844.452897][T15314] ? kasan_set_track+0x25/0x30 [ 844.457737][T15314] mon_bin_open+0x209/0x4a0 [ 844.462346][T15314] ? mon_bin_read+0x600/0x600 [ 844.467114][T15314] chrdev_open+0x26a/0x770 [ 844.471594][T15314] ? __unregister_chrdev+0x110/0x110 [ 844.476946][T15314] ? fsnotify_perm.part.0+0x221/0x610 [ 844.482394][T15314] do_dentry_open+0x6cc/0x13f0 [ 844.487221][T15314] ? __unregister_chrdev+0x110/0x110 [ 844.492575][T15314] ? may_open+0x1f6/0x420 [ 844.496983][T15314] path_openat+0x1baa/0x2750 [ 844.501644][T15314] ? path_lookupat+0x840/0x840 [ 844.506493][T15314] do_filp_open+0x1ba/0x410 [ 844.511065][T15314] ? may_open_dev+0xf0/0xf0 [ 844.515638][T15314] ? find_held_lock+0x2d/0x110 [ 844.520482][T15314] ? do_raw_spin_lock+0x124/0x2b0 [ 844.525592][T15314] ? spin_bug+0x1c0/0x1c0 [ 844.530012][T15314] ? _raw_spin_unlock+0x28/0x40 [ 844.534923][T15314] ? alloc_fd+0x2e4/0x750 [ 844.539338][T15314] do_sys_openat2+0x16d/0x4c0 [ 844.544088][T15314] ? build_open_flags+0x720/0x720 [ 844.549189][T15314] ? xfd_validate_state+0x5d/0x180 [ 844.554407][T15314] __x64_sys_openat+0x143/0x1f0 [ 844.559331][T15314] ? __ia32_sys_open+0x1c0/0x1c0 [ 844.564349][T15314] ? syscall_enter_from_user_mode+0x26/0x80 [ 844.570420][T15314] do_syscall_64+0x39/0xb0 [ 844.574991][T15314] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 844.580977][T15314] RIP: 0033:0x7f31e643e284 [ 844.585446][T15314] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 844.605187][T15314] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 844.613622][T15314] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 844.621612][T15314] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c 22:58:56 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 13) 22:58:56 executing program 5: bpf$MAP_CREATE(0x22, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1d, &(0x7f0000000140)={r0}, 0x10) [ 844.629602][T15314] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 844.637625][T15314] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 844.645639][T15314] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 844.653660][T15314] [ 844.668574][T15319] FAULT_INJECTION: forcing a failure. [ 844.668574][T15319] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 844.722647][T15319] CPU: 0 PID: 15319 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 844.732630][T15319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 844.742724][T15319] Call Trace: [ 844.746011][T15319] [ 844.748954][T15319] dump_stack_lvl+0x136/0x150 [ 844.753663][T15319] should_fail_ex+0x4a3/0x5b0 [ 844.758373][T15319] prepare_alloc_pages+0x178/0x570 [ 844.763515][T15319] __alloc_pages+0x149/0x4a0 [ 844.768131][T15319] ? find_held_lock+0x2d/0x110 [ 844.772912][T15319] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 844.779769][T15319] alloc_pages+0x1aa/0x270 [ 844.784257][T15319] get_zeroed_page+0x14/0x40 [ 844.788908][T15319] mon_alloc_buff+0xbc/0x180 [ 844.793546][T15319] ? kasan_set_track+0x25/0x30 [ 844.798341][T15319] mon_bin_open+0x209/0x4a0 [ 844.802882][T15319] ? mon_bin_read+0x600/0x600 [ 844.807606][T15319] chrdev_open+0x26a/0x770 [ 844.812064][T15319] ? __unregister_chrdev+0x110/0x110 [ 844.817409][T15319] ? fsnotify_perm.part.0+0x221/0x610 [ 844.822808][T15319] do_dentry_open+0x6cc/0x13f0 [ 844.827593][T15319] ? __unregister_chrdev+0x110/0x110 [ 844.832918][T15319] ? may_open+0x1f6/0x420 [ 844.837334][T15319] path_openat+0x1baa/0x2750 [ 844.841956][T15319] ? path_lookupat+0x840/0x840 [ 844.846756][T15319] do_filp_open+0x1ba/0x410 [ 844.851270][T15319] ? may_open_dev+0xf0/0xf0 [ 844.855785][T15319] ? find_held_lock+0x2d/0x110 [ 844.860663][T15319] ? do_raw_spin_lock+0x124/0x2b0 [ 844.865713][T15319] ? spin_bug+0x1c0/0x1c0 [ 844.870074][T15319] ? _raw_spin_unlock+0x28/0x40 [ 844.874956][T15319] ? alloc_fd+0x2e4/0x750 [ 844.879315][T15319] do_sys_openat2+0x16d/0x4c0 [ 844.884037][T15319] ? build_open_flags+0x720/0x720 [ 844.889147][T15319] __x64_sys_openat+0x143/0x1f0 [ 844.894059][T15319] ? __ia32_sys_open+0x1c0/0x1c0 [ 844.899056][T15319] ? ksys_write+0x1a3/0x250 [ 844.903647][T15319] ? syscall_enter_from_user_mode+0x26/0x80 [ 844.909579][T15319] do_syscall_64+0x39/0xb0 [ 844.914109][T15319] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 844.920043][T15319] RIP: 0033:0x7f954c23e284 [ 844.924467][T15319] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 844.944087][T15319] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 844.952523][T15319] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 844.960550][T15319] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 844.968551][T15319] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 844.976536][T15319] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 844.984582][T15319] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 844.992603][T15319] [ 845.000960][T15335] FAULT_INJECTION: forcing a failure. [ 845.000960][T15335] name fail_page_alloc, interval 1, probability 0, space 0, times 0 22:58:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 14) 22:58:56 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x12, 0x0, 0x0) 22:58:57 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r1, 0x25, 0xa}, 0x10) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1e, &(0x7f0000000140)={r0}, 0x10) 22:58:57 executing program 5: bpf$MAP_CREATE(0x23, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:57 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x12, 0x0, 0x0) [ 845.019892][T15335] CPU: 1 PID: 15335 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 845.029874][T15335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 845.039993][T15335] Call Trace: [ 845.043317][T15335] [ 845.046283][T15335] dump_stack_lvl+0x136/0x150 [ 845.051027][T15335] should_fail_ex+0x4a3/0x5b0 [ 845.055809][T15335] prepare_alloc_pages+0x178/0x570 [ 845.061015][T15335] __alloc_pages+0x149/0x4a0 [ 845.065684][T15335] ? find_held_lock+0x2d/0x110 [ 845.070506][T15335] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 845.077373][T15335] alloc_pages+0x1aa/0x270 [ 845.081861][T15335] get_zeroed_page+0x14/0x40 [ 845.086513][T15335] mon_alloc_buff+0xbc/0x180 [ 845.091171][T15335] ? kasan_set_track+0x25/0x30 [ 845.096016][T15335] mon_bin_open+0x209/0x4a0 [ 845.100627][T15335] ? mon_bin_read+0x600/0x600 [ 845.105367][T15335] chrdev_open+0x26a/0x770 [ 845.109852][T15335] ? __unregister_chrdev+0x110/0x110 [ 845.115200][T15335] ? fsnotify_perm.part.0+0x221/0x610 22:58:57 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) [ 845.120641][T15335] do_dentry_open+0x6cc/0x13f0 [ 845.125469][T15335] ? __unregister_chrdev+0x110/0x110 [ 845.130824][T15335] ? may_open+0x1f6/0x420 [ 845.135235][T15335] path_openat+0x1baa/0x2750 [ 845.139902][T15335] ? trace_lock_acquire+0x12d/0x180 [ 845.145162][T15335] ? path_lookupat+0x840/0x840 [ 845.150004][T15335] do_filp_open+0x1ba/0x410 [ 845.154588][T15335] ? may_open_dev+0xf0/0xf0 [ 845.159147][T15335] ? find_held_lock+0x2d/0x110 [ 845.163977][T15335] ? do_raw_spin_lock+0x124/0x2b0 [ 845.169067][T15335] ? spin_bug+0x1c0/0x1c0 22:58:57 executing program 3: bpf$MAP_CREATE(0x22, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 845.173471][T15335] ? _raw_spin_unlock+0x28/0x40 [ 845.178377][T15335] ? alloc_fd+0x2e4/0x750 [ 845.182776][T15335] do_sys_openat2+0x16d/0x4c0 [ 845.187513][T15335] ? build_open_flags+0x720/0x720 [ 845.192633][T15335] __x64_sys_openat+0x143/0x1f0 [ 845.197541][T15335] ? __ia32_sys_open+0x1c0/0x1c0 [ 845.202543][T15335] ? ksys_write+0x1a3/0x250 [ 845.207118][T15335] ? syscall_enter_from_user_mode+0x26/0x80 [ 845.213178][T15335] do_syscall_64+0x39/0xb0 [ 845.217663][T15335] entry_SYSCALL_64_after_hwframe+0x63/0xcd 22:58:57 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) [ 845.223679][T15335] RIP: 0033:0x7f31e643e284 [ 845.228145][T15335] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 845.247892][T15335] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 845.256360][T15335] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 845.264385][T15335] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 845.272403][T15335] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 845.280410][T15335] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 845.288425][T15335] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 845.296487][T15335] [ 845.337176][T15352] FAULT_INJECTION: forcing a failure. [ 845.337176][T15352] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 845.351156][T15352] CPU: 1 PID: 15352 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 845.361111][T15352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 845.371205][T15352] Call Trace: [ 845.374516][T15352] [ 845.377509][T15352] dump_stack_lvl+0x136/0x150 [ 845.382258][T15352] should_fail_ex+0x4a3/0x5b0 [ 845.387013][T15352] prepare_alloc_pages+0x178/0x570 [ 845.392205][T15352] __alloc_pages+0x149/0x4a0 [ 845.396890][T15352] ? find_held_lock+0x2d/0x110 [ 845.401806][T15352] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 845.408665][T15352] alloc_pages+0x1aa/0x270 [ 845.413147][T15352] get_zeroed_page+0x14/0x40 [ 845.417794][T15352] mon_alloc_buff+0xbc/0x180 [ 845.422436][T15352] ? kasan_set_track+0x25/0x30 [ 845.427240][T15352] mon_bin_open+0x209/0x4a0 [ 845.431780][T15352] ? mon_bin_read+0x600/0x600 [ 845.436492][T15352] chrdev_open+0x26a/0x770 [ 845.440936][T15352] ? __unregister_chrdev+0x110/0x110 [ 845.446258][T15352] ? fsnotify_perm.part.0+0x221/0x610 [ 845.451673][T15352] do_dentry_open+0x6cc/0x13f0 [ 845.456460][T15352] ? __unregister_chrdev+0x110/0x110 [ 845.461796][T15352] ? may_open+0x1f6/0x420 [ 845.466174][T15352] path_openat+0x1baa/0x2750 [ 845.470808][T15352] ? path_lookupat+0x840/0x840 [ 845.475619][T15352] do_filp_open+0x1ba/0x410 [ 845.480245][T15352] ? may_open_dev+0xf0/0xf0 [ 845.484831][T15352] ? find_held_lock+0x2d/0x110 [ 845.489655][T15352] ? do_raw_spin_lock+0x124/0x2b0 [ 845.494728][T15352] ? spin_bug+0x1c0/0x1c0 [ 845.499104][T15352] ? _raw_spin_unlock+0x28/0x40 [ 845.503988][T15352] ? alloc_fd+0x2e4/0x750 [ 845.508370][T15352] do_sys_openat2+0x16d/0x4c0 [ 845.513102][T15352] ? build_open_flags+0x720/0x720 [ 845.518178][T15352] __x64_sys_openat+0x143/0x1f0 [ 845.523065][T15352] ? __ia32_sys_open+0x1c0/0x1c0 [ 845.528042][T15352] ? ksys_write+0x1a3/0x250 [ 845.532618][T15352] ? syscall_enter_from_user_mode+0x26/0x80 [ 845.538564][T15352] do_syscall_64+0x39/0xb0 [ 845.543002][T15352] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 845.548935][T15352] RIP: 0033:0x7f954c23e284 [ 845.553374][T15352] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 845.573101][T15352] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 22:58:57 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 14) 22:58:57 executing program 5: bpf$MAP_CREATE(0x300, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:57 executing program 3: bpf$MAP_CREATE(0x22, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 845.581541][T15352] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 845.589547][T15352] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 845.597540][T15352] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 845.605534][T15352] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 845.613539][T15352] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 845.621639][T15352] 22:58:57 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 15) 22:58:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x21, &(0x7f0000000140)={r0}, 0x10) 22:58:57 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:57 executing program 5: bpf$MAP_CREATE(0x500, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:57 executing program 3: bpf$MAP_CREATE(0x22, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 845.709658][T15360] FAULT_INJECTION: forcing a failure. [ 845.709658][T15360] name fail_page_alloc, interval 1, probability 0, space 0, times 0 22:58:57 executing program 2: faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x1000) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:57 executing program 5: bpf$MAP_CREATE(0x600, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x22, &(0x7f0000000140)={r0}, 0x10) [ 845.829045][T15360] CPU: 0 PID: 15360 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 845.839115][T15360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 845.849237][T15360] Call Trace: [ 845.852606][T15360] [ 845.855586][T15360] dump_stack_lvl+0x136/0x150 [ 845.860332][T15360] should_fail_ex+0x4a3/0x5b0 [ 845.865069][T15360] prepare_alloc_pages+0x178/0x570 [ 845.870233][T15360] __alloc_pages+0x149/0x4a0 [ 845.874887][T15360] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 845.881880][T15360] ? asm_exc_int3+0x39/0x40 [ 845.886413][T15360] ? __kmem_cache_alloc_node+0x213/0x320 [ 845.892094][T15360] alloc_pages+0x1aa/0x270 [ 845.896565][T15360] get_zeroed_page+0x14/0x40 [ 845.901188][T15360] mon_alloc_buff+0xbc/0x180 [ 845.905810][T15360] ? kasan_set_track+0x25/0x30 [ 845.910614][T15360] mon_bin_open+0x209/0x4a0 [ 845.915158][T15360] ? mon_bin_read+0x600/0x600 [ 845.919868][T15360] chrdev_open+0x26a/0x770 [ 845.924312][T15360] ? __unregister_chrdev+0x110/0x110 [ 845.929625][T15360] ? fsnotify_perm.part.0+0x221/0x610 [ 845.935043][T15360] do_dentry_open+0x6cc/0x13f0 [ 845.939836][T15360] ? __unregister_chrdev+0x110/0x110 [ 845.945155][T15360] ? may_open+0x1f6/0x420 [ 845.949527][T15360] path_openat+0x1baa/0x2750 [ 845.954243][T15360] ? path_lookupat+0x840/0x840 [ 845.959042][T15360] do_filp_open+0x1ba/0x410 [ 845.963590][T15360] ? may_open_dev+0xf0/0xf0 [ 845.968119][T15360] ? find_held_lock+0x2d/0x110 [ 845.972934][T15360] ? do_raw_spin_lock+0x124/0x2b0 [ 845.978000][T15360] ? spin_bug+0x1c0/0x1c0 [ 845.982368][T15360] ? _raw_spin_unlock+0x28/0x40 [ 845.987244][T15360] ? alloc_fd+0x2e4/0x750 [ 845.991611][T15360] do_sys_openat2+0x16d/0x4c0 [ 845.996321][T15360] ? build_open_flags+0x720/0x720 [ 846.001393][T15360] __x64_sys_openat+0x143/0x1f0 [ 846.006270][T15360] ? __ia32_sys_open+0x1c0/0x1c0 [ 846.011233][T15360] ? ksys_write+0x1a3/0x250 [ 846.015789][T15360] ? syscall_enter_from_user_mode+0x26/0x80 [ 846.021732][T15360] do_syscall_64+0x39/0xb0 [ 846.026195][T15360] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 846.032155][T15360] RIP: 0033:0x7f31e643e284 [ 846.036617][T15360] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 846.056266][T15360] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 846.064723][T15360] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 22:58:58 executing program 5: bpf$MAP_CREATE(0x700, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 846.072732][T15360] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 846.080731][T15360] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 846.088817][T15360] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 846.096811][T15360] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 846.104844][T15360] [ 846.138536][T15368] FAULT_INJECTION: forcing a failure. [ 846.138536][T15368] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 846.159660][T15368] CPU: 0 PID: 15368 Comm: syz-executor.1 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 846.169628][T15368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 846.179814][T15368] Call Trace: [ 846.183126][T15368] [ 846.186104][T15368] dump_stack_lvl+0x136/0x150 [ 846.190857][T15368] should_fail_ex+0x4a3/0x5b0 [ 846.195619][T15368] prepare_alloc_pages+0x178/0x570 [ 846.200808][T15368] __alloc_pages+0x149/0x4a0 [ 846.205472][T15368] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 846.212341][T15368] alloc_pages+0x1aa/0x270 [ 846.216830][T15368] get_zeroed_page+0x14/0x40 [ 846.221491][T15368] mon_alloc_buff+0xbc/0x180 [ 846.226135][T15368] ? kasan_set_track+0x25/0x30 [ 846.230971][T15368] mon_bin_open+0x209/0x4a0 22:58:58 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 15) 22:58:58 executing program 3: bpf$MAP_CREATE(0x22, 0x0, 0x0) 22:58:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x23, &(0x7f0000000140)={r0}, 0x10) [ 846.235540][T15368] ? mon_bin_read+0x600/0x600 [ 846.240284][T15368] chrdev_open+0x26a/0x770 [ 846.244768][T15368] ? __unregister_chrdev+0x110/0x110 [ 846.250116][T15368] ? fsnotify_perm.part.0+0x221/0x610 [ 846.255570][T15368] do_dentry_open+0x6cc/0x13f0 [ 846.260400][T15368] ? __unregister_chrdev+0x110/0x110 [ 846.265757][T15368] ? may_open+0x1f6/0x420 [ 846.270167][T15368] path_openat+0x1baa/0x2750 [ 846.274833][T15368] ? trace_lock_acquire+0x12d/0x180 [ 846.280096][T15368] ? path_lookupat+0x840/0x840 [ 846.284926][T15368] do_filp_open+0x1ba/0x410 [ 846.289492][T15368] ? may_open_dev+0xf0/0xf0 [ 846.294056][T15368] ? find_held_lock+0x2d/0x110 [ 846.298904][T15368] ? do_raw_spin_lock+0x124/0x2b0 [ 846.304018][T15368] ? spin_bug+0x1c0/0x1c0 [ 846.308437][T15368] ? _raw_spin_unlock+0x28/0x40 [ 846.313344][T15368] ? alloc_fd+0x2e4/0x750 [ 846.317752][T15368] do_sys_openat2+0x16d/0x4c0 [ 846.322496][T15368] ? build_open_flags+0x720/0x720 [ 846.327596][T15368] __x64_sys_openat+0x143/0x1f0 [ 846.332518][T15368] ? __ia32_sys_open+0x1c0/0x1c0 [ 846.337521][T15368] ? ksys_write+0x1a3/0x250 [ 846.342104][T15368] ? syscall_enter_from_user_mode+0x26/0x80 [ 846.348085][T15368] do_syscall_64+0x39/0xb0 [ 846.352573][T15368] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 846.358584][T15368] RIP: 0033:0x7f954c23e284 [ 846.363146][T15368] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 846.382898][T15368] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 846.391380][T15368] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 846.399402][T15368] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 846.407436][T15368] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 846.415426][T15368] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 846.423425][T15368] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 846.431454][T15368] [ 846.444696][T15383] FAULT_INJECTION: forcing a failure. [ 846.444696][T15383] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 846.459520][T15383] CPU: 1 PID: 15383 Comm: syz-executor.4 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 846.469473][T15383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 846.479852][T15383] Call Trace: [ 846.483195][T15383] [ 846.486166][T15383] dump_stack_lvl+0x136/0x150 22:58:58 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 16) 22:58:58 executing program 2: recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/82, 0x52, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:58 executing program 5: bpf$MAP_CREATE(0x900, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:58 executing program 3: bpf$MAP_CREATE(0x22, 0x0, 0x0) 22:58:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x6a24c0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, 0x0, 0x2c}, 0x10) [ 846.490936][T15383] should_fail_ex+0x4a3/0x5b0 [ 846.495789][T15383] prepare_alloc_pages+0x178/0x570 [ 846.500995][T15383] __alloc_pages+0x149/0x4a0 [ 846.505655][T15383] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 846.512519][T15383] alloc_pages+0x1aa/0x270 [ 846.517007][T15383] get_zeroed_page+0x14/0x40 [ 846.521659][T15383] mon_alloc_buff+0xbc/0x180 [ 846.526306][T15383] ? kasan_set_track+0x25/0x30 [ 846.531142][T15383] mon_bin_open+0x209/0x4a0 [ 846.535792][T15383] ? mon_bin_read+0x600/0x600 [ 846.540617][T15383] chrdev_open+0x26a/0x770 [ 846.545099][T15383] ? __unregister_chrdev+0x110/0x110 [ 846.550459][T15383] ? fsnotify_perm.part.0+0x221/0x610 [ 846.555904][T15383] do_dentry_open+0x6cc/0x13f0 [ 846.560734][T15383] ? __unregister_chrdev+0x110/0x110 [ 846.566056][T15383] ? may_open+0x1f6/0x420 [ 846.570465][T15383] path_openat+0x1baa/0x2750 [ 846.575105][T15383] ? path_lookupat+0x840/0x840 [ 846.579919][T15383] do_filp_open+0x1ba/0x410 [ 846.584552][T15383] ? may_open_dev+0xf0/0xf0 [ 846.589090][T15383] ? find_held_lock+0x2d/0x110 [ 846.593905][T15383] ? do_raw_spin_lock+0x124/0x2b0 [ 846.598978][T15383] ? spin_bug+0x1c0/0x1c0 [ 846.603437][T15383] ? _raw_spin_unlock+0x28/0x40 [ 846.608322][T15383] ? alloc_fd+0x2e4/0x750 [ 846.612695][T15383] do_sys_openat2+0x16d/0x4c0 [ 846.617410][T15383] ? build_open_flags+0x720/0x720 [ 846.623787][T15383] __x64_sys_openat+0x143/0x1f0 [ 846.628689][T15383] ? __ia32_sys_open+0x1c0/0x1c0 [ 846.633663][T15383] ? ksys_write+0x1a3/0x250 [ 846.638219][T15383] ? syscall_enter_from_user_mode+0x26/0x80 [ 846.644166][T15383] do_syscall_64+0x39/0xb0 [ 846.648621][T15383] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 846.654569][T15383] RIP: 0033:0x7f31e643e284 [ 846.659108][T15383] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 846.678744][T15383] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 846.687184][T15383] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 22:58:58 executing program 5: bpf$MAP_CREATE(0xa00, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 846.695263][T15383] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 846.703264][T15383] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 846.711254][T15383] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 846.719245][T15383] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 846.727268][T15383] [ 846.758096][T15395] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 846.769885][T15395] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 846.778358][T15395] CPU: 1 PID: 15395 Comm: syz-executor.0 Not tainted 6.3.0-rc3-next-20230324-syzkaller #0 [ 846.788291][T15395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 846.798392][T15395] RIP: 0010:bpf_struct_ops_link_create+0xb1/0x390 [ 846.804944][T15395] Code: 75 82 eb ff 48 85 c0 48 89 c5 0f 84 9e 02 00 00 e8 44 32 dd ff 48 8d 7d 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 60 02 00 00 44 8b 65 18 bf 1a [ 846.824573][T15395] RSP: 0018:ffffc90004c17c38 EFLAGS: 00010203 [ 846.830655][T15395] RAX: dffffc0000000000 RBX: 1ffff92000982f87 RCX: ffffc90004f32000 [ 846.838648][T15395] RDX: 0000000000000001 RSI: ffffffff81a5a41c RDI: 000000000000000f [ 846.846638][T15395] RBP: fffffffffffffff7 R08: 0000000000000007 R09: 0000000000000000 [ 846.854630][T15395] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 [ 846.862617][T15395] R13: 000000000000002c R14: ffffc90004c17de8 R15: 0000000000000000 [ 846.870692][T15395] FS: 00007f4593cc3700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 846.879648][T15395] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 846.886260][T15395] CR2: 00007f4592fa7294 CR3: 0000000029e31000 CR4: 00000000003506e0 [ 846.894250][T15395] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 846.902238][T15395] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 846.910222][T15395] Call Trace: [ 846.913509][T15395] [ 846.916453][T15395] ? bpf_struct_ops_put+0x20/0x20 [ 846.921519][T15395] ? __might_fault+0xb2/0x190 [ 846.926286][T15395] ? bpf_lsm_bpf+0x9/0x10 [ 846.930666][T15395] ? security_bpf+0x87/0xb0 [ 846.935203][T15395] __sys_bpf+0x3b77/0x53b0 [ 846.939653][T15395] ? bpf_perf_link_attach+0x520/0x520 [ 846.945063][T15395] ? do_futex+0x132/0x360 [ 846.949483][T15395] ? rcu_is_watching+0x12/0xb0 [ 846.954314][T15395] __x64_sys_bpf+0x79/0xc0 [ 846.958766][T15395] ? syscall_enter_from_user_mode+0x26/0x80 [ 846.964698][T15395] do_syscall_64+0x39/0xb0 [ 846.969141][T15395] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 846.975078][T15395] RIP: 0033:0x7f4592e8c0f9 [ 846.979512][T15395] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 846.999140][T15395] RSP: 002b:00007f4593cc3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 847.007591][T15395] RAX: ffffffffffffffda RBX: 00007f4592fabf80 RCX: 00007f4592e8c0f9 [ 847.015578][T15395] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 000000000000001c [ 847.023564][T15395] RBP: 00007f4592ee7b39 R08: 0000000000000000 R09: 0000000000000000 [ 847.031547][T15395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 847.039541][T15395] R13: 00007ffdbcd2b64f R14: 00007f4593cc3300 R15: 0000000000022000 [ 847.047537][T15395] [ 847.050563][T15395] Modules linked in: [ 847.062963][T15392] FAULT_INJECTION: forcing a failure. [ 847.062963][T15392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 847.076335][T15392] CPU: 0 PID: 15392 Comm: syz-executor.1 Tainted: G D 6.3.0-rc3-next-20230324-syzkaller #0 [ 847.087762][T15392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 847.097856][T15392] Call Trace: [ 847.101163][T15392] [ 847.104123][T15392] dump_stack_lvl+0x136/0x150 [ 847.108862][T15392] should_fail_ex+0x4a3/0x5b0 [ 847.113585][T15392] prepare_alloc_pages+0x178/0x570 [ 847.118731][T15392] ? spin_bug+0x1c0/0x1c0 [ 847.123091][T15392] __alloc_pages+0x149/0x4a0 [ 847.127711][T15392] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 847.134520][T15392] ? asm_exc_int3+0x39/0x40 [ 847.139069][T15392] ? __kmem_cache_alloc_node+0x213/0x320 [ 847.144733][T15392] alloc_pages+0x1aa/0x270 [ 847.149179][T15392] get_zeroed_page+0x14/0x40 [ 847.153793][T15392] mon_alloc_buff+0xbc/0x180 [ 847.158421][T15392] ? kasan_set_track+0x25/0x30 [ 847.163215][T15392] mon_bin_open+0x209/0x4a0 [ 847.167769][T15392] ? mon_bin_read+0x600/0x600 [ 847.172472][T15392] chrdev_open+0x26a/0x770 [ 847.177008][T15392] ? __unregister_chrdev+0x110/0x110 [ 847.182329][T15392] ? fsnotify_perm.part.0+0x221/0x610 [ 847.187733][T15392] do_dentry_open+0x6cc/0x13f0 [ 847.192527][T15392] ? __unregister_chrdev+0x110/0x110 [ 847.197837][T15392] ? may_open+0x1f6/0x420 [ 847.202217][T15392] path_openat+0x1baa/0x2750 [ 847.206833][T15392] ? path_lookupat+0x840/0x840 [ 847.211636][T15392] do_filp_open+0x1ba/0x410 [ 847.216161][T15392] ? may_open_dev+0xf0/0xf0 [ 847.220682][T15392] ? find_held_lock+0x2d/0x110 [ 847.225471][T15392] ? do_raw_spin_lock+0x124/0x2b0 [ 847.230525][T15392] ? spin_bug+0x1c0/0x1c0 [ 847.234888][T15392] ? _raw_spin_unlock+0x28/0x40 [ 847.239757][T15392] ? alloc_fd+0x2e4/0x750 [ 847.244122][T15392] do_sys_openat2+0x16d/0x4c0 [ 847.248826][T15392] ? build_open_flags+0x720/0x720 [ 847.253887][T15392] __x64_sys_openat+0x143/0x1f0 [ 847.258761][T15392] ? __ia32_sys_open+0x1c0/0x1c0 [ 847.263733][T15392] ? ksys_write+0x1a3/0x250 [ 847.268278][T15392] ? syscall_enter_from_user_mode+0x26/0x80 [ 847.274218][T15392] do_syscall_64+0x39/0xb0 [ 847.278659][T15392] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 847.284587][T15392] RIP: 0033:0x7f954c23e284 [ 847.289045][T15392] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 22:58:59 executing program 2: recvfrom$llc(0xffffffffffffffff, 0x0, 0x0, 0x10120, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:59 executing program 5: bpf$MAP_CREATE(0xb00, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 22:58:59 executing program 3: bpf$MAP_CREATE(0x22, 0x0, 0x0) [ 847.308669][T15392] RSP: 002b:00007f954cf8dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 847.317135][T15392] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f954c23e284 [ 847.325128][T15392] RDX: 0000000000000000 RSI: 00007f954cf8dd40 RDI: 00000000ffffff9c [ 847.333115][T15392] RBP: 00007f954cf8dd40 R08: 0000000000000000 R09: 0000000000000000 [ 847.341101][T15392] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 847.349091][T15392] R13: 00007ffc0a4f734f R14: 00007f954cf8e300 R15: 0000000000022000 [ 847.357086][T15392] 22:58:59 executing program 4: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) (fail_nth: 16) 22:58:59 executing program 2: recvfrom$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x1a, 0x302, 0x6, 0x7, 0x80, 0x20, @local}, 0x10) 22:58:59 executing program 3: bpf$MAP_CREATE(0x22, &(0x7f0000000080)=@bloom_filter, 0x48) 22:58:59 executing program 1: syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) [ 847.376702][T15395] ---[ end trace 0000000000000000 ]--- [ 847.390066][T15395] RIP: 0010:bpf_struct_ops_link_create+0xb1/0x390 22:58:59 executing program 5: bpf$MAP_CREATE(0xc00, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 847.442455][T15407] FAULT_INJECTION: forcing a failure. [ 847.442455][T15407] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 847.462449][T15395] Code: 75 82 eb ff 48 85 c0 48 89 c5 0f 84 9e 02 00 00 e8 44 32 dd ff 48 8d 7d 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 60 02 00 00 44 8b 65 18 bf 1a [ 847.479058][T15407] CPU: 0 PID: 15407 Comm: syz-executor.4 Tainted: G D 6.3.0-rc3-next-20230324-syzkaller #0 [ 847.493595][T15407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 847.503689][T15407] Call Trace: [ 847.507077][T15407] [ 847.510038][T15407] dump_stack_lvl+0x136/0x150 [ 847.514790][T15407] should_fail_ex+0x4a3/0x5b0 [ 847.519551][T15407] prepare_alloc_pages+0x178/0x570 [ 847.522559][T15395] RSP: 0018:ffffc90004c17c38 EFLAGS: 00010203 [ 847.524716][T15407] __alloc_pages+0x149/0x4a0 [ 847.532293][T15395] [ 847.535400][T15407] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 847.537786][T15395] RAX: dffffc0000000000 RBX: 1ffff92000982f87 RCX: ffffc90004f32000 [ 847.544493][T15407] ? rcu_is_watching+0x12/0xb0 [ 847.544550][T15407] ? fs_reclaim_acquire+0xb6/0x160 [ 847.553941][T15395] RDX: 0000000000000001 RSI: ffffffff81a5a41c RDI: 000000000000000f [ 847.557463][T15407] ? lock_acquire+0x32/0xc0 [ 847.562942][T15395] RBP: fffffffffffffff7 R08: 0000000000000007 R09: 0000000000000000 [ 847.570552][T15407] ? fs_reclaim_acquire+0xb6/0x160 [ 847.570603][T15407] alloc_pages+0x1aa/0x270 [ 847.575465][T15395] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 [ 847.583096][T15407] get_zeroed_page+0x14/0x40 [ 847.583140][T15407] mon_alloc_buff+0xbc/0x180 [ 847.583176][T15407] ? kasan_set_track+0x25/0x30 [ 847.583219][T15407] mon_bin_open+0x209/0x4a0 [ 847.583258][T15407] ? mon_bin_read+0x600/0x600 [ 847.590802][T15395] R13: 000000000000002c R14: ffffc90004c17de8 R15: 0000000000000000 [ 847.592803][T15407] chrdev_open+0x26a/0x770 [ 847.601379][T15395] FS: 00007f4593cc3700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 847.605377][T15407] ? __unregister_chrdev+0x110/0x110 [ 847.610323][T15395] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 847.614724][T15407] ? fsnotify_perm.part.0+0x221/0x610 [ 847.619281][T15395] CR2: 00007fd334d821b8 CR3: 0000000029e31000 CR4: 00000000003506e0 [ 847.623902][T15407] do_dentry_open+0x6cc/0x13f0 [ 847.623940][T15407] ? __unregister_chrdev+0x110/0x110 [ 847.636047][T15395] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 847.636299][T15407] ? may_open+0x1f6/0x420 [ 847.645550][T15395] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 847.650502][T15407] path_openat+0x1baa/0x2750 [ 847.650539][T15407] ? trace_lock_acquire+0x50/0x180 [ 847.650579][T15407] ? path_lookupat+0x840/0x840 [ 847.650608][T15407] ? _kstrtoul+0xf0/0xf0 [ 847.650662][T15407] do_filp_open+0x1ba/0x410 [ 847.650695][T15407] ? may_open_dev+0xf0/0xf0 [ 847.650734][T15407] ? do_raw_spin_lock+0x124/0x2b0 [ 847.650780][T15407] ? spin_bug+0x1c0/0x1c0 [ 847.650822][T15407] ? lock_acquire+0x32/0xc0 [ 847.650860][T15407] ? alloc_fd+0x63/0x750 [ 847.650904][T15407] ? _raw_spin_unlock+0x28/0x40 [ 847.650937][T15407] ? alloc_fd+0x2e4/0x750 [ 847.650982][T15407] do_sys_openat2+0x16d/0x4c0 [ 847.651025][T15407] ? build_open_flags+0x720/0x720 [ 847.651074][T15407] __x64_sys_openat+0x143/0x1f0 [ 847.651115][T15407] ? __ia32_sys_open+0x1c0/0x1c0 [ 847.660119][T15395] Kernel panic - not syncing: Fatal exception [ 847.663058][T15407] ? ksys_write+0x1a3/0x250 [ 847.671059][T15407] ? rcu_is_watching+0x12/0xb0 [ 847.675861][T15407] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 847.681240][T15407] do_syscall_64+0x39/0xb0 [ 847.689233][T15407] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 847.693607][T15407] RIP: 0033:0x7f31e643e284 [ 847.701587][T15407] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 847.706192][T15407] RSP: 002b:00007f31e712dca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 847.716059][T15407] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f31e643e284 [ 847.720357][T15407] RDX: 0000000000000000 RSI: 00007f31e712dd40 RDI: 00000000ffffff9c [ 847.724873][T15407] RBP: 00007f31e712dd40 R08: 0000000000000000 R09: 0000000000000000 [ 847.729376][T15407] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 847.734398][T15407] R13: 00007ffe0e9405ef R14: 00007f31e712e300 R15: 0000000000022000 [ 847.738750][T15407] [ 847.743461][T15395] Kernel Offset: disabled [ 847.887753][T15395] Rebooting in 86400 seconds..