&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) 16:43:09 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x8}) 16:43:09 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000400), 0x4) [ 524.492986][ T829] vhci_hcd: connection closed [ 524.493457][ T9] vhci_hcd: stop threads [ 524.503185][ T9] vhci_hcd: release socket [ 524.520252][ T9] vhci_hcd: disconnect device 16:43:09 executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, 0x0) 16:43:09 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x0, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 524.628991][ T840] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 524.635693][ T840] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 524.704650][ T840] vhci_hcd vhci_hcd.0: Device attached [ 524.742933][ T842] vhci_hcd: connection closed [ 524.743361][ T197] vhci_hcd: stop threads [ 524.756253][ T197] vhci_hcd: release socket [ 524.777934][ T197] vhci_hcd: disconnect device [ 524.791309][ T849] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 524.797979][ T849] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 524.850346][ T849] vhci_hcd vhci_hcd.0: Device attached [ 524.867294][ T851] vhci_hcd: connection closed [ 524.874111][ T209] vhci_hcd: stop threads [ 524.900523][ T209] vhci_hcd: release socket [ 524.905004][ T209] vhci_hcd: disconnect device 16:43:10 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000400), 0x4) 16:43:10 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x8}) 16:43:10 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000400), 0x4) 16:43:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) 16:43:10 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x0, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:10 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x0, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:10 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000400), 0x4) [ 525.127468][ T866] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 525.134051][ T866] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 525.162254][ T870] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 525.168838][ T870] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:10 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x8}) 16:43:10 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x0, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 525.194445][ T870] vhci_hcd vhci_hcd.0: Device attached [ 525.202065][ T869] vhci_hcd vhci_hcd.0: port 0 already used [ 525.207627][ T871] vhci_hcd: connection closed [ 525.210159][ T209] vhci_hcd: stop threads [ 525.224442][ T866] vhci_hcd vhci_hcd.0: Device attached [ 525.240242][ T209] vhci_hcd: release socket [ 525.260906][ T867] vhci_hcd: connection closed [ 525.270905][ T209] vhci_hcd: disconnect device [ 525.320419][ T209] vhci_hcd: stop threads [ 525.350882][ T209] vhci_hcd: release socket 16:43:10 executing program 5: socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000400), 0x4) 16:43:10 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:10 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x0, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 525.373107][ T209] vhci_hcd: disconnect device [ 525.412789][ T884] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 525.419458][ T884] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 525.441775][ T888] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 525.448401][ T888] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:10 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) [ 525.473250][ T888] vhci_hcd vhci_hcd.0: Device attached [ 525.495167][ T884] vhci_hcd vhci_hcd.0: Device attached [ 525.502975][ T890] vhci_hcd: connection closed [ 525.503428][ T209] vhci_hcd: stop threads [ 525.513052][ T209] vhci_hcd: release socket 16:43:10 executing program 5: socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000400), 0x4) [ 525.528494][ T209] vhci_hcd: disconnect device [ 525.533324][ T885] vhci_hcd: connection closed [ 525.546867][ T209] vhci_hcd: stop threads [ 525.563389][ T896] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 525.570144][ T896] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 525.591056][ T209] vhci_hcd: release socket [ 525.611949][ T896] vhci_hcd vhci_hcd.0: Device attached [ 525.620274][ T209] vhci_hcd: disconnect device [ 525.643387][ T898] vhci_hcd: connection closed [ 525.645099][ T209] vhci_hcd: stop threads 16:43:10 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 525.675105][ T209] vhci_hcd: release socket [ 525.704877][ T209] vhci_hcd: disconnect device 16:43:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) 16:43:10 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) 16:43:10 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:10 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:10 executing program 5: socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000400), 0x4) [ 525.795860][ T906] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 525.802448][ T906] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 525.855547][ T906] vhci_hcd vhci_hcd.0: Device attached [ 525.892957][ T907] vhci_hcd: connection closed [ 525.900107][ T9] vhci_hcd: stop threads [ 525.914472][ T915] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 525.921250][ T915] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 525.938634][ T9] vhci_hcd: release socket 16:43:10 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, 0x0, 0x0) 16:43:10 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) [ 525.950088][ T917] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 525.956752][ T917] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 525.969668][ T9] vhci_hcd: disconnect device [ 525.977275][ T924] vhci_hcd vhci_hcd.0: port 0 already used [ 525.989996][ T915] vhci_hcd vhci_hcd.0: Device attached [ 526.010230][ T917] vhci_hcd vhci_hcd.0: Device attached [ 526.013816][ T920] vhci_hcd: connection closed [ 526.017783][ T1611] vhci_hcd: stop threads [ 526.033917][ T1611] vhci_hcd: release socket 16:43:11 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 526.049577][ T921] vhci_hcd: connection closed [ 526.067931][ T1611] vhci_hcd: disconnect device 16:43:11 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 526.114400][ T1611] vhci_hcd: stop threads 16:43:11 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, 0x0, 0x0) 16:43:11 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) 16:43:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) [ 526.158050][ T1611] vhci_hcd: release socket [ 526.177192][ T1611] vhci_hcd: disconnect device [ 526.216272][ T935] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 526.222856][ T935] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 526.266530][ T941] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 526.273314][ T941] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 526.307290][ T935] vhci_hcd vhci_hcd.0: Device attached [ 526.319983][ T948] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 526.326867][ T948] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 526.346683][ T936] vhci_hcd: connection closed [ 526.355815][T28274] usb 14-1: SetAddress Request (31) to port 0 [ 526.365308][ T941] vhci_hcd vhci_hcd.0: Device attached [ 526.367822][ T1611] vhci_hcd: stop threads [ 526.383274][ T1611] vhci_hcd: release socket [ 526.389852][T28274] usb 14-1: new SuperSpeed USB device number 31 using vhci_hcd [ 526.401266][ T948] vhci_hcd vhci_hcd.0: Device attached [ 526.406938][ T945] vhci_hcd: connection closed [ 526.407778][ T1611] vhci_hcd: disconnect device [ 526.431607][ T950] vhci_hcd: connection closed [ 526.443218][ T1611] vhci_hcd: stop threads [ 526.452819][T28274] usb 14-1: enqueue for inactive port 0 [ 526.459141][T28274] usb 14-1: enqueue for inactive port 0 [ 526.470274][ T1611] vhci_hcd: release socket [ 526.479382][ T1611] vhci_hcd: disconnect device [ 526.495047][ T1611] vhci_hcd: stop threads 16:43:11 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:11 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:11 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, 0x0, 0x0) 16:43:11 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:11 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:11 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x8}) [ 526.514883][T28274] usb 14-1: enqueue for inactive port 0 [ 526.531026][ T1611] vhci_hcd: release socket [ 526.549340][ T1611] vhci_hcd: disconnect device [ 526.655033][ T960] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 526.661615][ T960] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 526.689394][ T964] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 526.693157][ T965] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) 16:43:11 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f00000000c0)={0x40002000}) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) getsockopt$SO_J1939_PROMISC(0xffffffffffffffff, 0x6b, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000400), 0x4) [ 526.695967][ T964] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 526.702478][ T965] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:11 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3a, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d7", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 526.750708][ T972] vhci_hcd vhci_hcd.0: port 0 already used [ 526.784080][ T960] vhci_hcd vhci_hcd.0: Device attached [ 526.796556][ T965] vhci_hcd vhci_hcd.0: Device attached [ 526.804565][ T964] vhci_hcd vhci_hcd.0: Device attached [ 526.825776][ T966] vhci_hcd: connection closed [ 526.826853][ T1611] vhci_hcd: stop threads [ 526.836082][ T968] vhci_hcd: connection closed [ 526.836346][T28274] usb 14-1: SetAddress Request (32) to port 0 [ 526.858088][ T969] vhci_hcd: connection closed [ 526.859714][ T1611] vhci_hcd: release socket [ 526.874825][T28274] usb 14-1: new SuperSpeed USB device number 32 using vhci_hcd 16:43:11 executing program 5: accept(0xffffffffffffffff, 0x0, &(0x7f0000000700)) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000100)='.pending_reads\x00', 0x208001, 0x23) bind$can_j1939(r1, &(0x7f0000000140)={0x1d, 0x0, 0x0, {0x1, 0x1, 0x2}, 0xfe}, 0x18) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x8}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) r3 = openat$incfs(r2, &(0x7f00000001c0)='.log\x00', 0x80, 0x10) symlinkat(&(0x7f0000000180)='./file0\x00', r3, &(0x7f0000000200)='./file0\x00') [ 526.902746][ T1611] vhci_hcd: disconnect device [ 526.925799][ T1611] vhci_hcd: stop threads [ 526.932953][ T982] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 526.939523][ T982] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 526.964857][ T1611] vhci_hcd: release socket 16:43:11 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) 16:43:11 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:11 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 526.984658][ T1611] vhci_hcd: disconnect device [ 527.001645][ T982] vhci_hcd vhci_hcd.0: Device attached [ 527.012256][ T1611] vhci_hcd: stop threads [ 527.037779][ T983] vhci_hcd: connection closed [ 527.055904][ T1611] vhci_hcd: release socket [ 527.090413][ T1611] vhci_hcd: disconnect device [ 527.116520][ T1611] vhci_hcd: stop threads [ 527.126360][ T1611] vhci_hcd: release socket [ 527.140081][ T1611] vhci_hcd: disconnect device [ 527.152203][ T993] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 527.158796][ T993] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 527.163280][ T994] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 527.172637][ T992] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 527.173088][ T994] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 527.179588][ T992] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 527.211524][ T993] vhci_hcd vhci_hcd.0: Device attached [ 527.223264][ T992] vhci_hcd vhci_hcd.0: Device attached [ 527.226527][ T995] vhci_hcd: connection closed [ 527.234615][ T28] vhci_hcd: stop threads [ 527.248031][ T994] vhci_hcd vhci_hcd.0: Device attached [ 527.267951][ T996] vhci_hcd: connection reset by peer [ 527.278934][ T28] vhci_hcd: release socket [ 527.285883][ T997] vhci_hcd: connection closed [ 527.295256][ T28] vhci_hcd: disconnect device [ 527.325285][ T28] vhci_hcd: stop threads [ 527.335212][ T28] vhci_hcd: release socket 16:43:12 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:12 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r3, 0x80984120, &(0x7f0000000400)) 16:43:12 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:43:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) [ 527.357172][ T28] vhci_hcd: disconnect device 16:43:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 527.391333][ T28] vhci_hcd: stop threads [ 527.412387][ T28] vhci_hcd: release socket 16:43:12 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 527.441355][ T28] vhci_hcd: disconnect device [ 527.458189][ T1009] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 527.464834][ T1009] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 527.485586][T28325] usb 18-1: enqueue for inactive port 0 16:43:12 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 527.499906][ T1010] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 527.506634][ T1010] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 527.515678][ T1009] vhci_hcd vhci_hcd.0: Device attached [ 527.522971][ T1019] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 527.529547][ T1019] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 527.557297][ T1018] vhci_hcd vhci_hcd.0: port 0 already used [ 527.574186][ T1019] vhci_hcd vhci_hcd.0: Device attached [ 527.580287][ T1011] vhci_hcd: connection closed [ 527.580706][ T28] vhci_hcd: stop threads [ 527.590931][ T28] vhci_hcd: release socket [ 527.599486][ T1028] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 527.605862][ T28] vhci_hcd: disconnect device [ 527.606039][ T1028] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 527.625796][ T1010] vhci_hcd vhci_hcd.0: Device attached [ 527.644893][ T1020] vhci_hcd: connection closed [ 527.645272][ T28] vhci_hcd: stop threads [ 527.655657][ T28] vhci_hcd: release socket 16:43:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 527.664182][ T1015] vhci_hcd: connection closed [ 527.693156][ T28] vhci_hcd: disconnect device [ 527.719367][ T1028] vhci_hcd vhci_hcd.0: Device attached [ 527.729934][ T28] vhci_hcd: stop threads 16:43:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:12 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:12 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x5, 0x103000) r1 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000040)={0x1}) [ 527.755670][ T28] vhci_hcd: release socket [ 527.760165][ T1029] vhci_hcd: connection closed [ 527.764113][ T28] vhci_hcd: disconnect device [ 527.778866][ T28] vhci_hcd: stop threads [ 527.793513][ T28] vhci_hcd: release socket [ 527.825699][ T28] vhci_hcd: disconnect device 16:43:12 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 528.005662][T28325] usb usb18-port1: Cannot enable. Maybe the USB cable is bad? [ 528.018753][T28325] usb usb18-port1: attempt power cycle [ 528.035109][ T1045] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 528.041684][ T1045] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 528.071499][ T1045] vhci_hcd vhci_hcd.0: Device attached [ 528.091536][ T1046] vhci_hcd: connection closed [ 528.092049][ T28] vhci_hcd: stop threads 16:43:13 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:13 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 528.117853][ T28] vhci_hcd: release socket [ 528.128202][ T28] vhci_hcd: disconnect device 16:43:13 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 528.264750][ T1057] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 528.271372][ T1057] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 528.310240][ T1063] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 528.316850][ T1063] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 528.320830][ T1064] vhci_hcd vhci_hcd.0: port 0 already used [ 528.348897][ T1057] vhci_hcd vhci_hcd.0: Device attached [ 528.375628][T28325] usb usb18-port1: Cannot enable. Maybe the USB cable is bad? [ 528.396924][ T1059] vhci_hcd: connection closed [ 528.397259][ T197] vhci_hcd: stop threads [ 528.401099][ T1063] vhci_hcd vhci_hcd.0: Device attached [ 528.403217][ T197] vhci_hcd: release socket 16:43:13 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 528.424497][ T1066] vhci_hcd: connection closed [ 528.475460][ T197] vhci_hcd: disconnect device 16:43:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) [ 528.516496][ T197] vhci_hcd: stop threads [ 528.545504][ T197] vhci_hcd: release socket [ 528.575521][ T197] vhci_hcd: disconnect device [ 528.593202][ T1082] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 528.599784][ T1082] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 528.633291][ T1082] vhci_hcd vhci_hcd.0: Device attached [ 528.649105][ T1083] vhci_hcd: connection closed [ 528.652893][ T1085] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 528.656076][ T197] vhci_hcd: stop threads [ 528.657641][ T1085] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 528.665326][ T1085] vhci_hcd vhci_hcd.0: Device attached [ 528.688093][T28325] usb usb18-port1: Cannot enable. Maybe the USB cable is bad? [ 528.697265][ T197] vhci_hcd: release socket [ 528.701592][T28325] usb usb18-port1: unable to enumerate USB device [ 528.722444][ T197] vhci_hcd: disconnect device [ 528.732632][ T1088] vhci_hcd: connection closed [ 528.758683][ T197] vhci_hcd: stop threads [ 528.783588][ T197] vhci_hcd: release socket [ 528.790172][ T197] vhci_hcd: disconnect device 16:43:13 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:13 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) [ 529.031970][ T1103] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 529.038664][ T1103] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 529.068731][ T1107] vhci_hcd vhci_hcd.0: port 0 already used 16:43:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) [ 529.095561][ T1103] vhci_hcd vhci_hcd.0: Device attached [ 529.129170][ T1105] vhci_hcd: connection closed [ 529.135672][ T28] vhci_hcd: stop threads [ 529.147661][ T28] vhci_hcd: release socket 16:43:14 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) [ 529.171166][ T28] vhci_hcd: disconnect device 16:43:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) socket$inet_sctp(0x2, 0x5, 0x84) [ 529.211394][ T1115] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 529.217977][ T1115] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) [ 529.289946][ T1115] vhci_hcd vhci_hcd.0: Device attached 16:43:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 529.330013][ T1117] vhci_hcd: connection closed [ 529.330430][ T132] vhci_hcd: stop threads [ 529.353495][ T1124] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 529.353595][ T132] vhci_hcd: release socket [ 529.360168][ T1124] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 529.369394][ T1124] vhci_hcd vhci_hcd.0: Device attached 16:43:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) 16:43:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) [ 529.418313][ T1126] vhci_hcd: connection closed [ 529.469557][ T132] vhci_hcd: disconnect device [ 529.530378][ T132] vhci_hcd: stop threads [ 529.550687][ T132] vhci_hcd: release socket [ 529.573155][ T132] vhci_hcd: disconnect device 16:43:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:14 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) keyctl$assume_authority(0x10, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) 16:43:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:14 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) 16:43:14 executing program 5: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 529.739633][ T1146] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 529.746214][ T1146] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 529.776336][ T1154] vhci_hcd vhci_hcd.0: port 0 already used 16:43:14 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:14 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) [ 529.828126][ T1146] vhci_hcd vhci_hcd.0: Device attached [ 529.846480][ T1149] vhci_hcd: connection closed [ 529.847147][ T9] vhci_hcd: stop threads [ 529.865549][ T9] vhci_hcd: release socket [ 529.906766][ T9] vhci_hcd: disconnect device 16:43:14 executing program 5: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) 16:43:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x7, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:15 executing program 3: socket$inet_sctp(0x2, 0x0, 0x84) [ 530.145772][ T1171] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 530.152491][ T1171] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 530.191678][ T1171] vhci_hcd vhci_hcd.0: Device attached [ 530.233745][ T1172] vhci_hcd: connection closed [ 530.234293][ T132] vhci_hcd: stop threads [ 530.248618][ T132] vhci_hcd: release socket [ 530.287945][ T132] vhci_hcd: disconnect device 16:43:15 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x2, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:15 executing program 5: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:15 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r3, 0x80984120, &(0x7f0000000400)) 16:43:15 executing program 3: socket$inet_sctp(0x2, 0x0, 0x84) 16:43:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 530.493668][ T1195] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 530.500374][ T1195] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:15 executing program 1: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) [ 530.576411][ T1195] vhci_hcd vhci_hcd.0: Device attached [ 530.606210][ T1199] vhci_hcd: connection closed [ 530.606982][ T132] vhci_hcd: stop threads [ 530.645365][ T132] vhci_hcd: release socket [ 530.681674][ T132] vhci_hcd: disconnect device 16:43:15 executing program 3: socket$inet_sctp(0x2, 0x0, 0x84) 16:43:15 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x2, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:15 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:15 executing program 1: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 530.864214][ T1224] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 530.870961][ T1224] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:15 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x2, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:15 executing program 1: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 530.988437][ T1224] vhci_hcd vhci_hcd.0: Device attached [ 531.024155][ T1227] vhci_hcd: connection closed [ 531.024499][ T197] vhci_hcd: stop threads 16:43:16 executing program 3: r0 = socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b6c0)={0x11, 0x0, 0x0}, &(0x7f000000b700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000012040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000012080)=0x14, 0x800) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000123c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000012380)={&(0x7f00000120c0)={0x2b0, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x2b0}}, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_open_dev$admmidi(&(0x7f0000000000), 0x7a6, 0x10200) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r10, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) [ 531.035316][ T197] vhci_hcd: release socket [ 531.064749][ T197] vhci_hcd: disconnect device 16:43:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:16 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) 16:43:16 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x2, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 16:43:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:16 executing program 3: r0 = socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b6c0)={0x11, 0x0, 0x0}, &(0x7f000000b700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000012040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000012080)=0x14, 0x800) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000123c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000012380)={&(0x7f00000120c0)={0x2b0, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x2b0}}, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_open_dev$admmidi(&(0x7f0000000000), 0x7a6, 0x10200) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r10, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) [ 531.260597][ T1252] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 531.267182][ T1252] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:16 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) [ 531.340893][ T1252] vhci_hcd vhci_hcd.0: Device attached 16:43:16 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) [ 531.377984][ T1254] vhci_hcd: connection closed [ 531.382574][ T28] vhci_hcd: stop threads [ 531.401823][ T28] vhci_hcd: release socket 16:43:16 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 531.436466][ T28] vhci_hcd: disconnect device 16:43:16 executing program 3: r0 = socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b6c0)={0x11, 0x0, 0x0}, &(0x7f000000b700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000012040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000012080)=0x14, 0x800) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000123c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000012380)={&(0x7f00000120c0)={0x2b0, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x2b0}}, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_open_dev$admmidi(&(0x7f0000000000), 0x7a6, 0x10200) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r10, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:16 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:16 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:16 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) 16:43:16 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:16 executing program 3: r0 = socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b6c0)={0x11, 0x0, 0x0}, &(0x7f000000b700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000012040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000012080)=0x14, 0x800) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000123c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000012380)={&(0x7f00000120c0)={0x2b0, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x2b0}}, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_open_dev$admmidi(&(0x7f0000000000), 0x7a6, 0x10200) write$midi(0xffffffffffffffff, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:16 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:16 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:16 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) 16:43:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:16 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:16 executing program 3: r0 = socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b6c0)={0x11, 0x0, 0x0}, &(0x7f000000b700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000012040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000012080)=0x14, 0x800) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000123c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000012380)={&(0x7f00000120c0)={0x2b0, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x2b0}}, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_open_dev$admmidi(&(0x7f0000000000), 0x7a6, 0x10200) write$midi(0xffffffffffffffff, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) [ 531.965018][T28274] usb 14-1: device descriptor read/8, error -110 16:43:17 executing program 0: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) 16:43:17 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xffbffff5, 0x0) 16:43:17 executing program 3: r0 = socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b6c0)={0x11, 0x0, 0x0}, &(0x7f000000b700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000012040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000012080)=0x14, 0x800) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000123c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000012380)={&(0x7f00000120c0)={0x2b0, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x2b0}}, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_open_dev$admmidi(&(0x7f0000000000), 0x7a6, 0x10200) write$midi(0xffffffffffffffff, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:17 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) [ 532.095159][T28274] usb usb14-port1: attempt power cycle 16:43:17 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) 16:43:17 executing program 0: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) [ 532.224499][ T1323] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 532.231086][ T1323] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 532.242771][ T1323] vhci_hcd vhci_hcd.0: Device attached 16:43:17 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 532.267960][ T1325] vhci_hcd: connection closed [ 532.268395][ T9] vhci_hcd: stop threads [ 532.296191][ T9] vhci_hcd: release socket [ 532.326164][ T9] vhci_hcd: disconnect device 16:43:17 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) 16:43:17 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) 16:43:17 executing program 3: r0 = socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b6c0)={0x11, 0x0, 0x0}, &(0x7f000000b700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000012040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000012080)=0x14, 0x800) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000123c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000012380)={&(0x7f00000120c0)={0x2b0, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x2b0}}, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r10, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:17 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = socket(0x21, 0x4, 0x2) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000080)=0x7, 0x4) 16:43:17 executing program 0: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) [ 532.435018][T28274] usb usb14-port1: Cannot enable. Maybe the USB cable is bad? 16:43:17 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 532.534498][ T1338] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 532.541080][ T1338] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:17 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) [ 532.587383][ T1338] vhci_hcd vhci_hcd.0: Device attached [ 532.617346][ T1339] vhci_hcd: connection closed [ 532.619214][ T1611] vhci_hcd: stop threads [ 532.648469][ T1611] vhci_hcd: release socket 16:43:17 executing program 3: r0 = socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b6c0)={0x11, 0x0, 0x0}, &(0x7f000000b700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000012040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000012080)=0x14, 0x800) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000123c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000012380)={&(0x7f00000120c0)={0x2b0, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x2b0}}, 0x0) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r10, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:17 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = socket(0x21, 0x4, 0x2) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000080)=0x7, 0x4) [ 532.678815][ T1611] vhci_hcd: disconnect device 16:43:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:17 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:17 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) [ 532.775114][T28274] usb usb14-port1: Cannot enable. Maybe the USB cable is bad? [ 532.782970][T28274] usb usb14-port1: unable to enumerate USB device 16:43:17 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) [ 532.815355][ T1356] vhci_hcd vhci_hcd.0: port 0 already used 16:43:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) 16:43:17 executing program 3: socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b6c0), &(0x7f000000b700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000012040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000012080)=0x14, 0x800) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:17 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = socket(0x21, 0x4, 0x2) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000080)=0x7, 0x4) [ 532.902364][ T1365] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 532.909061][ T1365] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:17 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) [ 532.986321][ T1365] vhci_hcd vhci_hcd.0: Device attached [ 533.024862][ T1366] vhci_hcd: connection closed [ 533.032251][ T28] vhci_hcd: stop threads [ 533.060526][ T28] vhci_hcd: release socket [ 533.081382][ T28] vhci_hcd: disconnect device 16:43:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:18 executing program 3: socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b6c0), &(0x7f000000b700)=0x14) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:18 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket(0x21, 0x4, 0x2) 16:43:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) 16:43:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) 16:43:18 executing program 3: socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009b80)=0x14) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:18 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) socket(0x21, 0x4, 0x2) 16:43:18 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) 16:43:18 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = accept(r0, 0x0, &(0x7f0000000000)) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0xddd93f683371ecf5) 16:43:18 executing program 2: socket(0x21, 0x4, 0x2) 16:43:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:18 executing program 3: socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) [ 533.530453][ T1401] vhci_hcd vhci_hcd.0: port 0 already used 16:43:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:18 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = accept(r0, 0x0, &(0x7f0000000000)) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0xddd93f683371ecf5) 16:43:19 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:19 executing program 2: socket(0x0, 0x4, 0x2) 16:43:19 executing program 3: socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007e00)=0x14) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:19 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = accept(r0, 0x0, &(0x7f0000000000)) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0xddd93f683371ecf5) 16:43:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:19 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) accept(r0, 0x0, &(0x7f0000000000)) [ 534.226287][ T1436] vhci_hcd vhci_hcd.0: port 0 already used 16:43:19 executing program 3: socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000700)=0x14) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:19 executing program 4: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:19 executing program 2: socket(0x0, 0x4, 0x2) 16:43:19 executing program 5: accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 16:43:19 executing program 3: socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:19 executing program 0: socket(0x0, 0x4, 0x2) 16:43:19 executing program 4: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:19 executing program 2: socket(0x0, 0x4, 0x2) 16:43:19 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:19 executing program 5: accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 534.869772][ T1464] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 534.876464][ T1464] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:19 executing program 3: socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}], 0x2, &(0x7f0000000340)=""/131, 0x83}, 0x2001) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:19 executing program 4: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:19 executing program 5: accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 534.957513][ T1464] vhci_hcd vhci_hcd.0: Device attached 16:43:19 executing program 2: socket(0x21, 0x0, 0x2) 16:43:20 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x412140, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 535.013374][ T1469] vhci_hcd: connection closed [ 535.013728][ T132] vhci_hcd: stop threads [ 535.033973][ T132] vhci_hcd: release socket [ 535.061094][ T132] vhci_hcd: disconnect device 16:43:20 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:20 executing program 5: socket$can_j1939(0x1d, 0x2, 0x7) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 16:43:20 executing program 3: socket(0x29, 0x6, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:20 executing program 2: socket(0x21, 0x0, 0x0) 16:43:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) [ 535.203578][ T1486] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 535.210435][ T1486] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 535.226122][ T1486] vhci_hcd vhci_hcd.0: Device attached [ 535.258061][ T1487] vhci_hcd: connection closed [ 535.258593][ T9] vhci_hcd: stop threads [ 535.288553][ T9] vhci_hcd: release socket 16:43:20 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x412140, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 535.316596][ T9] vhci_hcd: disconnect device 16:43:20 executing program 5: socket$can_j1939(0x1d, 0x2, 0x7) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 16:43:20 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:20 executing program 3: socket(0x29, 0x6, 0x6) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:20 executing program 2: socket(0x21, 0x0, 0x0) 16:43:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:20 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x412140, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:20 executing program 5: socket$can_j1939(0x1d, 0x2, 0x7) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 535.529227][ T1506] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 535.535816][ T1506] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 535.572862][ T1506] vhci_hcd vhci_hcd.0: Device attached 16:43:20 executing program 2: socket(0x21, 0x0, 0x0) 16:43:20 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) [ 535.617202][ T1508] vhci_hcd: connection closed [ 535.618069][ T1611] vhci_hcd: stop threads [ 535.650553][ T1611] vhci_hcd: release socket [ 535.684766][ T1611] vhci_hcd: disconnect device 16:43:20 executing program 1: r0 = socket(0x27, 0x3, 0x6) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:20 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x412140, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) getsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:20 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) accept(r0, 0x0, 0x0) 16:43:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:20 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000000)=""/221) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_rr_get_interval(r0, &(0x7f0000002140)) 16:43:20 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:20 executing program 1: r0 = socket(0x27, 0x3, 0x6) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r4, 0x80984120, &(0x7f0000000400)) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r3, 0xc0385720, &(0x7f00000003c0)) 16:43:20 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x412140, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) getsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:20 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r4, 0x80984120, &(0x7f0000000400)) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r3, 0xc0385720, &(0x7f00000003c0)) [ 536.059765][ T1546] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(3) [ 536.066360][ T1546] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:21 executing program 1: r0 = socket(0x27, 0x3, 0x6) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 536.126599][ T1546] vhci_hcd vhci_hcd.0: Device attached [ 536.159235][ T1548] vhci_hcd: connection closed [ 536.159664][ T1611] vhci_hcd: stop threads 16:43:21 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) [ 536.173543][ T1611] vhci_hcd: release socket 16:43:21 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x412140, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) getsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 536.204686][ T1611] vhci_hcd: disconnect device [ 536.230325][ T1556] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 536.236913][ T1556] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:21 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:21 executing program 5: r0 = socket(0x23, 0x6, 0x1000005) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000000)=""/170, &(0x7f00000000c0)=0xaa) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:21 executing program 1: socket(0x27, 0x3, 0x6) [ 536.342533][ T1556] vhci_hcd vhci_hcd.0: Device attached [ 536.372626][ T1558] vhci_hcd: connection closed [ 536.373168][ T209] vhci_hcd: stop threads [ 536.385674][ T209] vhci_hcd: release socket 16:43:21 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x412140, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 536.408578][ T209] vhci_hcd: disconnect device 16:43:21 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001040), r0) socket$nl_generic(0x10, 0x3, 0x10) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000010c0)='ns/pid_for_children\x00') 16:43:21 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:21 executing program 5: r0 = socket(0x23, 0x6, 0x1000005) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000000)=""/170, &(0x7f00000000c0)=0xaa) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:21 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:21 executing program 1: socket(0x0, 0x3, 0x6) 16:43:21 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 16:43:21 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x10}) 16:43:21 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:21 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:21 executing program 5: r0 = socket(0x23, 0x6, 0x1000005) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000000)=""/170, &(0x7f00000000c0)=0xaa) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:21 executing program 1: socket(0x0, 0x3, 0x6) 16:43:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) 16:43:21 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001040), r0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000010c0)='ns/pid_for_children\x00') 16:43:21 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:21 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:21 executing program 5: r0 = socket(0x23, 0x6, 0x1000005) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000000)=""/170, &(0x7f00000000c0)=0xaa) 16:43:21 executing program 1: socket(0x0, 0x3, 0x6) 16:43:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) 16:43:22 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$midi(r0, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:22 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:22 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(0xffffffffffffffff, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:22 executing program 5: socket(0x23, 0x6, 0x1000005) 16:43:22 executing program 1: socket(0x27, 0x0, 0x6) 16:43:22 executing program 0: socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) 16:43:22 executing program 2: socket(0x0, 0x3, 0x6) 16:43:22 executing program 5: socket(0x0, 0x6, 0x1000005) 16:43:22 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(0xffffffffffffffff, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:22 executing program 1: socket(0x27, 0x0, 0x0) 16:43:22 executing program 0: socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:22 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) accept(0xffffffffffffffff, &(0x7f0000001780)=@can={0x1d, 0x0}, &(0x7f0000001800)=0x80) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001e00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001dc0)={&(0x7f0000000180)={0x568, r1, 0x10, 0x70bd2a, 0x25dfdc00, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x194, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_BITS={0x140, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'keyring\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'ip6_vti0\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '!^!/*\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x65b}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb880}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[-,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe0000000}]}, {0x4}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'H]%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*.\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x40, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'keyring\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '&}:^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x2c4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x9f, 0x5, "521e8990b32e9a9e04fc2cd961a2f65238d9df90fe4f492d9c871dc13a53ba00fe697813bcea6f31a9bce2c3b9e978ba2195b90fb6d202dc6b657189568fdbc0b40bbaf4cbbd8e8eee954496868f3f41656ba537f5bbb081f668a7ab1ef5ef0824996bf4c2f4a3fb6119857217224910484559ded565abfc7364cc6121fc5f01543dd0af79b15812dc58672edeed2a715dce18df73f68fb91934e8"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xe8, 0x4, "e5d3c801724d5a2fc2e74fccfdd549941fe830d573efec7807ac3991dd52caba89c04ce46541f6fb816b6ea22e65a0af9ab247e230c1c7963d711ebe0690991d0f208e6bf8c254db529aa277f0401799572171700392bec8882e76e0ea1081a2f041828f26cbbc1f17c8a2472dca47035136918e1a5531cbfe77b1cb1d2b25dc9961cf7e5c0d56196ce3611418be9d42a3bcde2f392ad4f7691db42388cf0d7f52ac01fe435a4480e4aa13dbed070d0ac28dfb4f9fc960481e659986a0681a799426782ea856f9e79649e70e5077f5b3598f991bbd6911c21d98333279125c893ad6134a"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x48, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'dns_resolver\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xd2, 0x4, "68b57ea4dd3af77c68b2dc2cdcc2530ae8f1a47c35326d2d2fb21dbf521c6e7f7399c156e1756f0ec59e6be70fb6694bc39012a9bbab93e4db19f7e7f689102d5cf836f1cdac9518f6ce6df437b86d208d75edeb4da8d785cb5ced30dfd122fdeae6ccf773f09a43e56b609ddc3cb52ddef8487c1083757ee45945e3a11df99fe9f7fccf3b26d4da5b6918e20c3a34181887a2a3780da1f7c8321648139f50eebf467c278f218ac154d31095f4cbde07eadd5fd8d25b2147de82ff7429b0f59795c959f2a3045e06cb6459c2744a"}]}]}, 0x568}, 0x1, 0x0, 0x0, 0x851}, 0x40) keyctl$search(0xa, r0, &(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:22 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(0xffffffffffffffff, &(0x7f0000000080)="96847c89a59ccc49c6a9fd0e208515146750e969b66d7342daa343", 0x1b) 16:43:22 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) accept(0xffffffffffffffff, &(0x7f0000001780)=@can={0x1d, 0x0}, &(0x7f0000001800)=0x80) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001e00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001dc0)={&(0x7f0000000180)={0x568, r1, 0x10, 0x70bd2a, 0x25dfdc00, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x194, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_BITS={0x140, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'keyring\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'ip6_vti0\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '!^!/*\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x65b}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb880}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[-,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe0000000}]}, {0x4}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'H]%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*.\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x40, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'keyring\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '&}:^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x2c4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x9f, 0x5, "521e8990b32e9a9e04fc2cd961a2f65238d9df90fe4f492d9c871dc13a53ba00fe697813bcea6f31a9bce2c3b9e978ba2195b90fb6d202dc6b657189568fdbc0b40bbaf4cbbd8e8eee954496868f3f41656ba537f5bbb081f668a7ab1ef5ef0824996bf4c2f4a3fb6119857217224910484559ded565abfc7364cc6121fc5f01543dd0af79b15812dc58672edeed2a715dce18df73f68fb91934e8"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xe8, 0x4, "e5d3c801724d5a2fc2e74fccfdd549941fe830d573efec7807ac3991dd52caba89c04ce46541f6fb816b6ea22e65a0af9ab247e230c1c7963d711ebe0690991d0f208e6bf8c254db529aa277f0401799572171700392bec8882e76e0ea1081a2f041828f26cbbc1f17c8a2472dca47035136918e1a5531cbfe77b1cb1d2b25dc9961cf7e5c0d56196ce3611418be9d42a3bcde2f392ad4f7691db42388cf0d7f52ac01fe435a4480e4aa13dbed070d0ac28dfb4f9fc960481e659986a0681a799426782ea856f9e79649e70e5077f5b3598f991bbd6911c21d98333279125c893ad6134a"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x48, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'dns_resolver\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xd2, 0x4, "68b57ea4dd3af77c68b2dc2cdcc2530ae8f1a47c35326d2d2fb21dbf521c6e7f7399c156e1756f0ec59e6be70fb6694bc39012a9bbab93e4db19f7e7f689102d5cf836f1cdac9518f6ce6df437b86d208d75edeb4da8d785cb5ced30dfd122fdeae6ccf773f09a43e56b609ddc3cb52ddef8487c1083757ee45945e3a11df99fe9f7fccf3b26d4da5b6918e20c3a34181887a2a3780da1f7c8321648139f50eebf467c278f218ac154d31095f4cbde07eadd5fd8d25b2147de82ff7429b0f59795c959f2a3045e06cb6459c2744a"}]}]}, 0x568}, 0x1, 0x0, 0x0, 0x851}, 0x40) keyctl$search(0xa, r0, &(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:22 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000000)=""/221) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_rr_get_interval(r0, &(0x7f0000002140)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = accept(r1, &(0x7f0000003840)=@l2={0x1f, 0x0, @fixed}, &(0x7f00000038c0)=0x80) recvmsg$can_j1939(r2, &(0x7f00000022c0)={&(0x7f0000002180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002280)=[{&(0x7f0000002200)=""/94, 0x5e}], 0x1}, 0x2100) 16:43:22 executing program 5: socket(0x0, 0x6, 0x1000005) 16:43:22 executing program 0: socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:22 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) accept(0xffffffffffffffff, &(0x7f0000001780)=@can={0x1d, 0x0}, &(0x7f0000001800)=0x80) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001e00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001dc0)={&(0x7f0000000180)={0x568, r1, 0x10, 0x70bd2a, 0x25dfdc00, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x194, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_BITS={0x140, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'keyring\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'ip6_vti0\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '!^!/*\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x65b}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb880}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[-,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe0000000}]}, {0x4}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'H]%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*.\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x40, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'keyring\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '&}:^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x2c4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x9f, 0x5, "521e8990b32e9a9e04fc2cd961a2f65238d9df90fe4f492d9c871dc13a53ba00fe697813bcea6f31a9bce2c3b9e978ba2195b90fb6d202dc6b657189568fdbc0b40bbaf4cbbd8e8eee954496868f3f41656ba537f5bbb081f668a7ab1ef5ef0824996bf4c2f4a3fb6119857217224910484559ded565abfc7364cc6121fc5f01543dd0af79b15812dc58672edeed2a715dce18df73f68fb91934e8"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xe8, 0x4, "e5d3c801724d5a2fc2e74fccfdd549941fe830d573efec7807ac3991dd52caba89c04ce46541f6fb816b6ea22e65a0af9ab247e230c1c7963d711ebe0690991d0f208e6bf8c254db529aa277f0401799572171700392bec8882e76e0ea1081a2f041828f26cbbc1f17c8a2472dca47035136918e1a5531cbfe77b1cb1d2b25dc9961cf7e5c0d56196ce3611418be9d42a3bcde2f392ad4f7691db42388cf0d7f52ac01fe435a4480e4aa13dbed070d0ac28dfb4f9fc960481e659986a0681a799426782ea856f9e79649e70e5077f5b3598f991bbd6911c21d98333279125c893ad6134a"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x48, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'dns_resolver\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xd2, 0x4, "68b57ea4dd3af77c68b2dc2cdcc2530ae8f1a47c35326d2d2fb21dbf521c6e7f7399c156e1756f0ec59e6be70fb6694bc39012a9bbab93e4db19f7e7f689102d5cf836f1cdac9518f6ce6df437b86d208d75edeb4da8d785cb5ced30dfd122fdeae6ccf773f09a43e56b609ddc3cb52ddef8487c1083757ee45945e3a11df99fe9f7fccf3b26d4da5b6918e20c3a34181887a2a3780da1f7c8321648139f50eebf467c278f218ac154d31095f4cbde07eadd5fd8d25b2147de82ff7429b0f59795c959f2a3045e06cb6459c2744a"}]}]}, 0x568}, 0x1, 0x0, 0x0, 0x851}, 0x40) keyctl$search(0xa, r0, &(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:22 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340), 0xa0840, 0x0) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, 0x0, 0x6, {0x1, 0x1, 0x3}, 0x2}, 0x18) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000140), &(0x7f0000000100)=0x4) 16:43:22 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$midi(r0, 0x0, 0x0) 16:43:22 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:22 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) accept(0xffffffffffffffff, &(0x7f0000001780)=@can={0x1d, 0x0}, &(0x7f0000001800)=0x80) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001e00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001dc0)={&(0x7f0000000180)={0x568, r1, 0x10, 0x70bd2a, 0x25dfdc00, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x194, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_BITS={0x140, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'keyring\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'ip6_vti0\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '!^!/*\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x65b}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb880}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'syz'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[-,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe0000000}]}, {0x4}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'H]%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*.\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x40, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'keyring\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '&}:^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x2c4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x9f, 0x5, "521e8990b32e9a9e04fc2cd961a2f65238d9df90fe4f492d9c871dc13a53ba00fe697813bcea6f31a9bce2c3b9e978ba2195b90fb6d202dc6b657189568fdbc0b40bbaf4cbbd8e8eee954496868f3f41656ba537f5bbb081f668a7ab1ef5ef0824996bf4c2f4a3fb6119857217224910484559ded565abfc7364cc6121fc5f01543dd0af79b15812dc58672edeed2a715dce18df73f68fb91934e8"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xe8, 0x4, "e5d3c801724d5a2fc2e74fccfdd549941fe830d573efec7807ac3991dd52caba89c04ce46541f6fb816b6ea22e65a0af9ab247e230c1c7963d711ebe0690991d0f208e6bf8c254db529aa277f0401799572171700392bec8882e76e0ea1081a2f041828f26cbbc1f17c8a2472dca47035136918e1a5531cbfe77b1cb1d2b25dc9961cf7e5c0d56196ce3611418be9d42a3bcde2f392ad4f7691db42388cf0d7f52ac01fe435a4480e4aa13dbed070d0ac28dfb4f9fc960481e659986a0681a799426782ea856f9e79649e70e5077f5b3598f991bbd6911c21d98333279125c893ad6134a"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x48, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'dns_resolver\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xd2, 0x4, "68b57ea4dd3af77c68b2dc2cdcc2530ae8f1a47c35326d2d2fb21dbf521c6e7f7399c156e1756f0ec59e6be70fb6694bc39012a9bbab93e4db19f7e7f689102d5cf836f1cdac9518f6ce6df437b86d208d75edeb4da8d785cb5ced30dfd122fdeae6ccf773f09a43e56b609ddc3cb52ddef8487c1083757ee45945e3a11df99fe9f7fccf3b26d4da5b6918e20c3a34181887a2a3780da1f7c8321648139f50eebf467c278f218ac154d31095f4cbde07eadd5fd8d25b2147de82ff7429b0f59795c959f2a3045e06cb6459c2744a"}]}]}, 0x568}, 0x1, 0x0, 0x0, 0x851}, 0x40) keyctl$search(0xa, r0, &(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:22 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, &(0x7f0000000040)) 16:43:22 executing program 5: socket(0x0, 0x6, 0x1000005) 16:43:22 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340), 0xa0840, 0x0) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, 0x0, 0x6, {0x1, 0x1, 0x3}, 0x2}, 0x18) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000140), &(0x7f0000000100)=0x4) 16:43:22 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:22 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:23 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) accept(0xffffffffffffffff, &(0x7f0000001780)=@can, &(0x7f0000001800)=0x80) keyctl$search(0xa, r0, &(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:23 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, &(0x7f0000000040)) 16:43:23 executing program 5: socket(0x23, 0x0, 0x1000005) 16:43:23 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340), 0xa0840, 0x0) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, 0x0, 0x6, {0x1, 0x1, 0x3}, 0x2}, 0x18) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000140), &(0x7f0000000100)=0x4) 16:43:23 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:23 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:23 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:23 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, &(0x7f0000000040)) 16:43:23 executing program 5: socket(0x23, 0x0, 0x0) 16:43:23 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340), 0xa0840, 0x0) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, 0x0, 0x6, {0x1, 0x1, 0x3}, 0x2}, 0x18) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) 16:43:23 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:23 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:23 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:23 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), 0x0) 16:43:23 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:23 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340), 0xa0840, 0x0) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, 0x0, 0x6, {0x1, 0x1, 0x3}, 0x2}, 0x18) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:23 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) 16:43:23 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020}, 0x2020) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:23 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) keyctl$search(0xa, 0x0, &(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:23 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), 0x0) 16:43:23 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:23 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340), 0xa0840, 0x0) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, 0x0, 0x6, {0x1, 0x1, 0x3}, 0x2}, 0x18) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) 16:43:23 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:23 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:23 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:23 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), 0x0) 16:43:23 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:23 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340), 0xa0840, 0x0) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, 0x0, 0x6, {0x1, 0x1, 0x3}, 0x2}, 0x18) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:23 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:24 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:24 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) 16:43:24 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:24 executing program 4: keyctl$search(0xa, 0x0, 0x0, &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:24 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340), 0xa0840, 0x0) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, 0x0, 0x6, {0x1, 0x1, 0x3}, 0x2}, 0x18) 16:43:24 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:24 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:24 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:24 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:24 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340), 0xa0840, 0x0) 16:43:24 executing program 4: keyctl$search(0xa, 0x0, 0x0, &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:24 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:24 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:24 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:24 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) 16:43:24 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020}, 0x2020) 16:43:24 executing program 4: keyctl$search(0xa, 0x0, 0x0, &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:24 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r4 = geteuid() r5 = getgid() r6 = getuid() r7 = getgid() write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r3, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r4, r5, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r6, r7, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:24 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000080)='dns_resolver\x00', 0x0, 0xfffffffffffffffc) 16:43:24 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:24 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() 16:43:24 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) 16:43:24 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) 16:43:24 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r4 = geteuid() r5 = getgid() r6 = getuid() write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r3, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r4, r5, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r6, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:24 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() 16:43:24 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000080)='dns_resolver\x00', 0x0, 0xfffffffffffffffc) 16:43:24 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:25 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) 16:43:25 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:25 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r4 = geteuid() r5 = getgid() write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r3, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r4, r5, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:25 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000080)='dns_resolver\x00', 0x0, 0xfffffffffffffffc) 16:43:25 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) 16:43:25 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) 16:43:25 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:25 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020}, 0x2020) 16:43:25 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r4 = geteuid() write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r3, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r4, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:25 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000080)='dns_resolver\x00', 0x0, 0xfffffffffffffffc) 16:43:25 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() 16:43:25 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:25 executing program 2: faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) 16:43:25 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() 16:43:25 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r3, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:25 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000080)='dns_resolver\x00', 0x0, 0xfffffffffffffffc) 16:43:25 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:25 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() 16:43:25 executing program 2: faccessat2(0xffffffffffffffff, 0x0, 0x1, 0x1000) 16:43:25 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() 16:43:25 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:25 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000080)='dns_resolver\x00', 0x0, 0xfffffffffffffffc) 16:43:25 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getuid() 16:43:25 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:25 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) 16:43:25 executing program 2: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x1000) 16:43:25 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:25 executing program 4: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 16:43:26 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getuid() 16:43:26 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:26 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() 16:43:26 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:26 executing program 2: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:43:26 executing program 4: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 16:43:26 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getuid() 16:43:26 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() 16:43:26 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:26 executing program 2: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:43:26 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:26 executing program 4: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 16:43:26 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) getuid() 16:43:26 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:26 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:26 executing program 2: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:43:26 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:26 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:26 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:26 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() 16:43:26 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) getuid() 16:43:26 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getgid() 16:43:26 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:26 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:26 executing program 1: keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:26 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() 16:43:26 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) getuid() 16:43:26 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getgid() 16:43:26 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:27 executing program 1: keyctl$set_timeout(0xf, 0x0, 0x0) 16:43:27 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:27 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() 16:43:27 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) getuid() 16:43:27 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:27 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getuid() 16:43:27 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:27 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) getgid() 16:43:27 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getuid() 16:43:27 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:27 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() 16:43:27 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getuid() 16:43:27 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:27 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) getgid() 16:43:27 executing program 5: getuid() 16:43:27 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:27 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() 16:43:27 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getuid() 16:43:27 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) getgid() 16:43:27 executing program 5: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:43:27 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:27 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:27 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:27 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:27 executing program 5: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:43:27 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) getgid() 16:43:27 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:27 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:27 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 5: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:43:28 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:28 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getgid() 16:43:28 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:28 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 0: getgid() 16:43:28 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:28 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 1: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:28 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:28 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:28 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:28 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() 16:43:28 executing program 1: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:29 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 16:43:29 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() 16:43:29 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:29 executing program 4: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:29 executing program 1: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:29 executing program 4: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:29 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:29 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, 0x0, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, 0x0, 0x0, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, 0x0, 0x0, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:29 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020}, 0x2020) 16:43:29 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) 16:43:29 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() 16:43:29 executing program 4: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:29 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r4 = geteuid() r5 = getgid() r6 = getuid() r7 = getgid() write$FUSE_DIRENTPLUS(r2, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r3, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r4, r5, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r6, r7, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, 0x0, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, 0x0, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, 0x0, 0x0, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:29 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffe45) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), 0x4) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) 16:43:29 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:29 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() 16:43:29 executing program 2: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:29 executing program 1: keyctl$search(0xa, 0x0, 0x0, &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:29 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:29 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:29 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) 16:43:29 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:29 executing program 1: keyctl$search(0xa, 0x0, 0x0, &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:29 executing program 2: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:29 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() 16:43:29 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:29 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:29 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:29 executing program 1: keyctl$search(0xa, 0x0, 0x0, &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 16:43:30 executing program 2: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:30 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() 16:43:30 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:30 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) keyctl$set_timeout(0xf, 0x0, 0x8000000000000008) 16:43:30 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:30 executing program 1: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 16:43:30 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) 16:43:30 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:30 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) 16:43:30 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000000)=""/221) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_rr_get_interval(r0, &(0x7f0000002140)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = accept(r1, &(0x7f0000003840)=@l2={0x1f, 0x0, @fixed}, &(0x7f00000038c0)=0x80) recvmsg$can_j1939(r2, &(0x7f00000022c0)={&(0x7f0000002180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002280)=[{&(0x7f0000002200)=""/94, 0x5e}], 0x1}, 0x2100) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) openat$incfs(r1, &(0x7f0000002300)='.pending_reads\x00', 0x101000, 0x190) 16:43:30 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) 16:43:30 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:30 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:30 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() 16:43:30 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r5, 0x80984120, &(0x7f0000000400)) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r4, 0xc0385720, &(0x7f00000003c0)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000240)={@desc={0x1, 0x0, @desc4}, 0x10, r0, '\x00', @d}) 16:43:30 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:30 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:30 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) 16:43:30 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r5 = geteuid() r6 = getgid() r7 = getuid() r8 = getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = getuid() r11 = getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004880)={0x460, 0x0, 0x0, [{{0x4, 0x1, 0x2, 0x7f, 0x7d, 0x80000000, {0x2, 0x4, 0xffff, 0x9, 0x2, 0x9, 0xe859, 0x9, 0x89ef, 0x0, 0xf7, 0xffffffffffffffff, 0xee00, 0xfb1, 0x10000}}, {0x4, 0x800}}, {{0x5, 0x0, 0x8000, 0x6, 0x3, 0x6af8, {0x3, 0x8, 0x87f4, 0xffffffffffff0001, 0x4, 0x3, 0x1, 0x148e, 0x2, 0x2000, 0xfffffa9d, r4, 0xee01, 0x0, 0x4}}, {0x5, 0x8, 0x1, 0x10001, ':'}}, {{0x1, 0x2, 0x9, 0xcfdf, 0x7, 0x9, {0x0, 0xfff, 0x20, 0xca3, 0x5, 0x100000000, 0x6, 0x6, 0x7, 0x2000, 0x6, r5, r6, 0x9, 0x200}}, {0x6, 0x9, 0x7, 0x80000001, '&:-}/)$'}}, {{0x6, 0x2, 0x3, 0x6, 0x6f55, 0x8, {0x2, 0x5, 0x3, 0x7, 0x9, 0x7fffffff, 0x1, 0x1, 0x8, 0x6000, 0x80000001, r7, r8, 0x3f, 0x3f}}, {0x1, 0xc513, 0x2, 0x9, '$('}}, {{0x3, 0x2, 0xbaeb, 0x3, 0x6, 0x1, {0x0, 0x3, 0xff, 0x8, 0x81, 0x9, 0x4, 0x46f, 0x0, 0x2000, 0x80, 0x0, r9, 0x2, 0x3}}, {0x4, 0x9e4, 0x5, 0xb81, 'syz0\x00'}}, {{0x6, 0x0, 0x2, 0x400, 0xfffffff9, 0x58b3102f, {0x3, 0x3, 0x2, 0x4, 0x7a, 0x27a, 0x1ff, 0x7fffffff, 0x2, 0x4000, 0x0, r10, 0xee00, 0x81, 0xfffffffa}}, {0x3, 0x2, 0x2, 0x1, 'e-'}}, {{0x0, 0x0, 0xff, 0xfffffffffffffffb, 0x8, 0x101, {0x0, 0x8001, 0x10000, 0x7fffffff, 0xffffffff, 0x1, 0x9d, 0x7, 0x1, 0x1000, 0x3, r11, r12, 0x2, 0x40c}}, {0x1, 0x6, 0x0, 0xbbe3}}]}, 0x460) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000002700)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000026c0)={&(0x7f00000024c0)={0x1d4, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xc24, @local, 0x80000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40e, @dev={0xfe, 0x80, '\x00', 0x30}, 0x5533b82a}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb40b3e43, @dev={0xfe, 0x80, '\x00', 0x32}, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @remote, 0x6}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000000) 16:43:30 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 545.803321][ T2180] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 545.809921][ T2180] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:43:30 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020}, 0x2020) [ 545.881055][ T2180] vhci_hcd vhci_hcd.0: Device attached 16:43:30 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020}, 0x2020) [ 545.927199][ T2183] vhci_hcd: connection closed [ 545.927724][ T28] vhci_hcd: stop threads [ 545.956011][ T28] vhci_hcd: release socket 16:43:30 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:30 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:30 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() [ 545.981216][ T28] vhci_hcd: disconnect device 16:43:31 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001040), r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000010c0)='ns/pid_for_children\x00') sendmsg$GTP_CMD_GETPDP(r2, &(0x7f00000011c0)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001100)={&(0x7f0000001540)={0x54, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_NET_NS_FD={0x8, 0x7, r3}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010101}, @GTPA_NET_NS_FD={0x8, 0x7, r4}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_TID={0xc}, @GTPA_TID={0xc, 0x3, 0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) accept4$packet(r0, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001180)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001240)=0x14, 0x800) accept4$packet(r0, &(0x7f0000003a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003ac0)=0x14, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000003e00)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003dc0)={&(0x7f0000001280)=ANY=[@ANYBLOB="840200a57e012ecd405bfdfe00", @ANYRES16=r1, @ANYBLOB="100025bd7000fcdbdf25170000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020067726574617030000000000000000000140002006d6163766c616e3000000000000000004c00018008000100", @ANYRES32=0x0, @ANYBLOB="1400020064756d6d79300000000000000000000008000300040000000800030001000000140002006d6163766c616e30000000000000000008000300020000003c000180140002006970365f76746930000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000001400020069703665727370616e300000000000006c00018008000100", @ANYRES32=0x0, @ANYBLOB="1400020073697430000000000000000000000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000800030001000000140002007465616d5f736c6176655f300000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="3c000180140002006272696467655f736c6176655f30000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468300000000000000000000000080003006aaf4ee43400018008000100", @ANYRES32=r5, @ANYBLOB="14000200776c616e30000000000000000000000014000200726f73653000000000000000000000002c000180140002006261746164765f736c6176655f3000001400020064756d6d7930000000000000000000003000018008000100", @ANYRES32=r6, @ANYBLOB="080003000200000008000300010000001400020076657468305f746f5f687372000000007c00018008000100", @ANYRES32=0x0, @ANYBLOB="140002006272696467655f736c6176655f31000014000200766c616e31000000000000000000000014000200626f6e645f736c6176655f300000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=r7, @ANYBLOB="1400020076657468315f746f5f62617461647600"], 0x284}, 0x1, 0x0, 0x0, 0x240000c0}, 0x20000000) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000000)="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", 0x1000) 16:43:31 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:31 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() 16:43:31 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() 16:43:31 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:31 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:31 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:31 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() 16:43:31 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() 16:43:31 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) getuid() getuid() read$FUSE(r2, &(0x7f0000002840)={0x2020}, 0x2020) 16:43:31 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:31 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001040), r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000010c0)='ns/pid_for_children\x00') sendmsg$GTP_CMD_GETPDP(r2, &(0x7f00000011c0)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001100)={&(0x7f0000001540)={0x54, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_NET_NS_FD={0x8, 0x7, r3}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010101}, @GTPA_NET_NS_FD={0x8, 0x7, r4}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_TID={0xc}, @GTPA_TID={0xc, 0x3, 0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) accept4$packet(r0, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001180)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001240)=0x14, 0x800) accept4$packet(r0, &(0x7f0000003a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003ac0)=0x14, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000003e00)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003dc0)={&(0x7f0000001280)=ANY=[@ANYBLOB="840200a57e012ecd405bfdfe00", @ANYRES16=r1, @ANYBLOB="100025bd7000fcdbdf25170000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020067726574617030000000000000000000140002006d6163766c616e3000000000000000004c00018008000100", @ANYRES32=0x0, @ANYBLOB="1400020064756d6d79300000000000000000000008000300040000000800030001000000140002006d6163766c616e30000000000000000008000300020000003c000180140002006970365f76746930000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000001400020069703665727370616e300000000000006c00018008000100", @ANYRES32=0x0, @ANYBLOB="1400020073697430000000000000000000000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000800030001000000140002007465616d5f736c6176655f300000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="3c000180140002006272696467655f736c6176655f30000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468300000000000000000000000080003006aaf4ee43400018008000100", @ANYRES32=r5, @ANYBLOB="14000200776c616e30000000000000000000000014000200726f73653000000000000000000000002c000180140002006261746164765f736c6176655f3000001400020064756d6d7930000000000000000000003000018008000100", @ANYRES32=r6, @ANYBLOB="080003000200000008000300010000001400020076657468305f746f5f687372000000007c00018008000100", @ANYRES32=0x0, @ANYBLOB="140002006272696467655f736c6176655f31000014000200766c616e31000000000000000000000014000200626f6e645f736c6176655f300000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=r7, @ANYBLOB="1400020076657468315f746f5f62617461647600"], 0x284}, 0x1, 0x0, 0x0, 0x240000c0}, 0x20000000) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000000)="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", 0x1000) 16:43:31 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000)=0x1, 0x4) socket$can_j1939(0x1d, 0x2, 0x7) r0 = socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:43:31 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) 16:43:31 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() read$FUSE(r2, &(0x7f0000000180)={0x2020}, 0x2020) 16:43:31 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r1 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x10}) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0xca5ee8b020a148e0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) accept(r4, 0x0, &(0x7f0000000000)) socket$can_j1939(0x1d, 0x2, 0x7) 16:43:31 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:31 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:31 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() 16:43:31 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000)=0x1, 0x4) socket$can_j1939(0x1d, 0x2, 0x7) r0 = socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:43:31 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') 16:43:31 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() getgid() 16:43:31 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:31 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() 16:43:31 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x4102, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:31 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000)=0x1, 0x4) socket$can_j1939(0x1d, 0x2, 0x7) r0 = socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:43:31 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() getuid() 16:43:31 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') 16:43:32 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:43:32 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000)=0x1, 0x4) socket$can_j1939(0x1d, 0x2, 0x7) socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 16:43:32 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:32 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x4102, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:32 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:32 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r1 = accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r0, &(0x7f00000006c0), &(0x7f0000000700)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') accept$packet(r1, &(0x7f0000000340), &(0x7f0000000380)=0x14) 16:43:32 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000)=0x1, 0x4) socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 16:43:32 executing program 5: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:32 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() 16:43:32 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x4102, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:32 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:32 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() 16:43:32 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000)=0x1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 16:43:32 executing program 5: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:32 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() 16:43:32 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x4102, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:32 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 16:43:32 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:32 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:32 executing program 0: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 16:43:32 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x4102, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:32 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) geteuid() 16:43:32 executing program 5: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:43:32 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() getgid() 16:43:32 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:32 executing program 0: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 16:43:32 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:32 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) geteuid() 16:43:32 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x4102, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:33 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:33 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) geteuid() 16:43:33 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:33 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) geteuid() 16:43:33 executing program 0: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000)=0x1, 0x4) socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 16:43:33 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000)=0x1, 0x4) socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 16:43:33 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:33 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:33 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x5d7180, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) 16:43:33 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:33 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) geteuid() 16:43:33 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x5d7180, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) 16:43:33 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) openat$incfs(0xffffffffffffffff, &(0x7f0000002440)='.pending_reads\x00', 0x14000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:33 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:33 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x5d7180, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) 16:43:33 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) geteuid() 16:43:33 executing program 2: accept4$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000200)={&(0x7f0000000100)}) 16:43:33 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) bind$can_j1939(r0, &(0x7f00000089c0)={0x1d, r1, 0x3, {0x0, 0x0, 0x5}, 0x2}, 0x18) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:33 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:33 executing program 2: accept4$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:33 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x5d7180, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) 16:43:33 executing program 3: geteuid() 16:43:33 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r2 = accept$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') accept$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0xe4, r0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40800}, 0x400c004) 16:43:33 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:33 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008980)={&(0x7f0000008680)=@can, 0x80, &(0x7f0000008880)=[{&(0x7f0000008700)=""/173, 0xad}, {&(0x7f00000087c0)=""/183, 0xb7}], 0x2, &(0x7f00000088c0)=""/183, 0xb7}, 0x12100) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:33 executing program 2: accept4$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) accept(r0, 0x0, &(0x7f0000000000)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x5d7180, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 16:43:34 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) accept(r0, 0x0, &(0x7f0000000000)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x5d7180, 0x0) 16:43:34 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:34 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) accept(r0, 0x0, &(0x7f0000000000)) 16:43:34 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 4: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x40000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 16:43:34 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:34 executing program 5: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 4: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x40000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 16:43:34 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:34 executing program 5: getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 3: getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x40000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:34 executing program 4: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x40000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 16:43:35 executing program 5: getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 3: getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 1: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x40000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002b80)=0x14, 0x81000) 16:43:35 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) accept(r0, 0x0, &(0x7f0000000000)) 16:43:35 executing program 3: getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 5: getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 1: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x40000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 0: socket$inet6_dccp(0xa, 0x6, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 16:43:35 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) accept4$packet(r0, 0x0, &(0x7f0000002b80), 0x81000) 16:43:35 executing program 3: getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:35 executing program 5: getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:35 executing program 0: socket$inet6_dccp(0xa, 0x6, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 16:43:35 executing program 1: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x40000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 3: getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:35 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) accept4$packet(r0, 0x0, 0x0, 0x81000) 16:43:35 executing program 5: getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:35 executing program 3: getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:35 executing program 0: socket$inet6_dccp(0xa, 0x6, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 16:43:35 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) 16:43:35 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:35 executing program 5: getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:35 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:35 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:35 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) accept(r0, 0x0, 0x0) 16:43:35 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) 16:43:36 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:36 executing program 5: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:36 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:36 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) 16:43:36 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:36 executing program 5: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 0: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:36 executing program 2: getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:36 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:36 executing program 5: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 0: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 2: getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:36 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:36 executing program 5: getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:36 executing program 0: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 2: getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:36 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:36 executing program 5: getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:36 executing program 0: getresuid(0x0, &(0x7f0000000080), 0x0) 16:43:36 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:36 executing program 2: getresuid(0x0, 0x0, &(0x7f00000000c0)) 16:43:37 executing program 5: getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 16:43:37 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:37 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 16:43:37 executing program 0: getresuid(0x0, &(0x7f0000000080), 0x0) 16:43:37 executing program 3: getresuid(0x0, &(0x7f0000000080), 0x0) 16:43:37 executing program 2: getresuid(0x0, 0x0, &(0x7f00000000c0)) 16:43:37 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 16:43:37 executing program 5: getresuid(0x0, 0x0, &(0x7f00000000c0)) 16:43:37 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:37 executing program 0: getresuid(0x0, &(0x7f0000000080), 0x0) 16:43:37 executing program 2: getresuid(0x0, 0x0, &(0x7f00000000c0)) 16:43:37 executing program 3: getresuid(0x0, &(0x7f0000000080), 0x0) 16:43:37 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r0, &(0x7f00000006c0), &(0x7f0000000700)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') 16:43:37 executing program 5: getresuid(0x0, 0x0, 0x0) 16:43:37 executing program 0: getresuid(&(0x7f0000000040), 0x0, 0x0) 16:43:37 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:37 executing program 2: getresuid(&(0x7f0000000040), 0x0, 0x0) 16:43:37 executing program 3: getresuid(0x0, &(0x7f0000000080), 0x0) 16:43:37 executing program 4: getresuid(0x0, &(0x7f0000000080), 0x0) 16:43:37 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r0, &(0x7f00000006c0), &(0x7f0000000700)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') 16:43:37 executing program 0: getresuid(&(0x7f0000000040), 0x0, 0x0) 16:43:37 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000005840), 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:37 executing program 4: getresuid(0x0, &(0x7f0000000080), 0x0) 16:43:37 executing program 3: getresuid(&(0x7f0000000040), 0x0, 0x0) 16:43:37 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = accept(r0, &(0x7f00000000c0)=@alg, &(0x7f0000000140)=0x80) getsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:43:37 executing program 0: getresuid(&(0x7f0000000040), 0x0, 0x0) 16:43:37 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') 16:43:37 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') 16:43:38 executing program 4: getresuid(0x0, &(0x7f0000000080), 0x0) 16:43:38 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') 16:43:38 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r0, &(0x7f00000006c0), &(0x7f0000000700)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') 16:43:38 executing program 0: getresuid(&(0x7f0000000040), 0x0, 0x0) 16:43:38 executing program 3: getresuid(&(0x7f0000000040), 0x0, 0x0) 16:43:38 executing program 2: getresuid(&(0x7f0000000040), 0x0, 0x0) 16:43:38 executing program 4: getresuid(0x0, 0x0, 0x0) 16:43:38 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:38 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r0, &(0x7f00000006c0), &(0x7f0000000700)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') 16:43:38 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r0, &(0x7f00000006c0), &(0x7f0000000700)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') 16:43:38 executing program 3: getresuid(&(0x7f0000000040), 0x0, 0x0) 16:43:38 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r1 = accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r0, &(0x7f00000006c0), &(0x7f0000000700)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') accept$packet(r1, &(0x7f0000000340), &(0x7f0000000380)=0x14) 16:43:38 executing program 4: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r1 = accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r0, &(0x7f00000006c0), &(0x7f0000000700)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') accept$packet(r1, &(0x7f0000000340), &(0x7f0000000380)=0x14) 16:43:38 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:38 executing program 1: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r2 = accept$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') accept$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0xe4, r0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40800}, 0x400c004) 16:43:38 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001cc0)=0x14, 0xc0000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r4 = accept$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) accept$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/time_for_children\x00') accept$packet(r4, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0xe4, r0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40800}, 0x400c004) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x0, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@GTPA_TID={0xc, 0x3, 0x3}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x240084d0}, 0x814) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000800)={0x288, r3, 0x709, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x274, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_VALUE={0x72, 0x4, "fde2aabcba0c159cc89abd5100b9fac570027fc11caf9a93150eb64c54a4982779708020e032b3f1bf1c61cbf94b7c71f9f893e203580d619d0043eb61a5e1a85dbe37b9137a203b79ff17e0091ab1b1ac29a3b21ae290d7b5083f34d88d2f44caf5a032419c2c5e3ea4628aee09"}, @ETHTOOL_A_BITSET_BITS={0x98, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, 'ns/time_for_children\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '[#\'[$::\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '^\xa2\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$:+@{&\x84\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0xbe, 0x4, "c9bd28e14832cfa7b6c6a58dcac45edf9c2ac092a0b2b6c8d4599833f444acb80f180bf4bc1b397024311972f1ea863db464ed6181f5c9ee18ca68d90132185fa5f0889f59f9e8e71c87d299a7a15e2374bda65a10ebb0cd8a50a6779fd54e297fa67ebf7426e0b6f034bbcd3a9b918e038d801848b8080313364ee26aa6461a28a3f0c4a1dd688edcaffcfe7d95167ede5ffc030beaafa1447a6eb850fcf255d7d8bf4505348d752823bca893502238ca15b755b5c7a5e069b7"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x7c, 0x4, "59f3c61c3fe5152b4c361de2ec3df36ddcaa4417694712ee6f4fa8108a69718a1e4eb66ce76b5c9dfd3daf6f81bb0d0870fee72ab9b1a9f3a2f47dff2b26ef228b344612f8a5a78a2b45f6c30f2e3848b0873b464caf5c43e5f53b960faa1b8e0a65b7b388badabb2cddd0a8704abc08947bfc2a3d1eee4c"}]}]}, 0x288}, 0x1, 0x0, 0x0, 0x8c0}, 0x4048800) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), 0xffffffffffffffff) accept$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0}, &(0x7f0000000680)=0x14) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB="94000000", @ANYRES16=r9, @ANYBLOB="02002dbd7000fcdbdf2511000000280001800800030003000000140002006d61637674617030000000000000000008000100", @ANYRES32=r10, @ANYBLOB="0c00018008000300030000004c00018008000100", @ANYRES32=r8, @ANYBLOB="08000300010000000800030002000000140002006d6163767461703000875a11f2e9bb21a3d9350000000000000014000200766972745f776966693000000000000008000100", @ANYRES32=r5, @ANYBLOB], 0x94}, 0x1, 0x0, 0x0, 0x4000}, 0x4004094) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001d80)={&(0x7f0000000740)={0x48, r3, 0x400, 0x0, 0x25dfdbff, {}, [@HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x0, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x0, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x0, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS, @ETHTOOL_A_HEADER_DEV_INDEX={0x0, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x0, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS, @ETHTOOL_A_HEADER_FLAGS, @ETHTOOL_A_HEADER_FLAGS={0x0, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x0, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x0, 0x3, 0x2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x815}, 0x8000) r11 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_SEND_PRIO(r11, 0x6b, 0x3, 0x0, 0x0) 16:43:38 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:38 executing program 2: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_PROMISC(0xffffffffffffffff, 0x6b, 0x2, &(0x7f0000000000), 0x4) syz_open_dev$dri(&(0x7f00000001c0), 0x1, 0x100) 16:43:38 executing program 4: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) 16:43:38 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) 16:43:38 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:38 executing program 1: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) 16:43:38 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x1, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:38 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)=0xfff, 0x4) 16:43:38 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:38 executing program 2: getsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000740), 0x101000, 0x0) 16:43:38 executing program 1: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) 16:43:38 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x1, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:38 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') 16:43:39 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:39 executing program 4: getsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000100)=""/233, 0xe9}, {&(0x7f0000000200)=""/203, 0x58}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/229, 0xe5}, {&(0x7f0000000440)=""/39, 0x27}], 0x5, &(0x7f0000000680)=""/185, 0xb9}, 0x40000100) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000740), 0x101000, 0x0) 16:43:39 executing program 2 (fault-call:0 fault-nth:0): getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:39 executing program 1 (fault-call:0 fault-nth:0): getresuid(0x0, 0x0, 0x0) 16:43:39 executing program 0: syz_open_procfs$namespace(0x0, 0x0) 16:43:39 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x1, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) [ 554.157492][ T2698] FAULT_INJECTION: forcing a failure. [ 554.157492][ T2698] name failslab, interval 1, probability 0, space 0, times 1 [ 554.239938][ T2698] CPU: 1 PID: 2698 Comm: syz-executor.2 Not tainted 5.13.0-rc4-syzkaller #0 [ 554.248687][ T2698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.257816][ T2703] FAULT_INJECTION: forcing a failure. [ 554.257816][ T2703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 554.258761][ T2698] Call Trace: [ 554.275094][ T2698] dump_stack+0x141/0x1d7 [ 554.279465][ T2698] should_fail.cold+0x5/0xa [ 554.284006][ T2698] ? __anon_vma_prepare+0x62/0x570 [ 554.289242][ T2698] should_failslab+0x5/0x10 [ 554.293831][ T2698] kmem_cache_alloc+0x5e/0x3a0 [ 554.298679][ T2698] __anon_vma_prepare+0x62/0x570 [ 554.303627][ T2698] do_huge_pmd_anonymous_page+0xd88/0x2570 [ 554.309499][ T2698] ? mark_lock+0xef/0x17b0 [ 554.314001][ T2698] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 554.320008][ T2698] __handle_mm_fault+0x2ffd/0x52c0 [ 554.325130][ T2698] ? vm_iomap_memory+0x190/0x190 [ 554.330093][ T2698] handle_mm_fault+0x1bc/0x7e0 [ 554.334863][ T2698] do_user_addr_fault+0x483/0x1210 [ 554.340054][ T2698] exc_page_fault+0x9e/0x180 [ 554.344648][ T2698] asm_exc_page_fault+0x1e/0x30 [ 554.349498][ T2698] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 554.355313][ T2698] Code: 00 00 48 39 d9 73 54 0f 1f 00 66 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 1f 00 <89> 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 554.375206][ T2698] RSP: 0018:ffffc90001c0fef8 EFLAGS: 00010293 [ 554.381453][ T2698] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 554.389424][ T2698] RDX: 0000000000040000 RSI: ffffffff8149bd64 RDI: 0000000000000000 [ 554.397408][ T2698] RBP: 0000000020000040 R08: 0000000000000000 R09: 0000000000000000 [ 554.405469][ T2698] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 [ 554.413438][ T2698] R13: 0000000020000080 R14: 0000000000000000 R15: 0000000000000000 [ 554.421523][ T2698] ? __x64_sys_getresuid+0x1b4/0x2a0 [ 554.426946][ T2698] __x64_sys_getresuid+0x1be/0x2a0 [ 554.432180][ T2698] do_syscall_64+0x3a/0xb0 [ 554.436608][ T2698] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 554.442503][ T2698] RIP: 0033:0x4665d9 [ 554.446504][ T2698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 554.466114][ T2698] RSP: 002b:00007f6b93fa3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000076 [ 554.474544][ T2698] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 554.482515][ T2698] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000040 16:43:39 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') [ 554.490602][ T2698] RBP: 00007f6b93fa31d0 R08: 0000000000000000 R09: 0000000000000000 [ 554.498588][ T2698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 554.506561][ T2698] R13: 0000000000a9fb1f R14: 00007f6b93fa3300 R15: 0000000000022000 16:43:39 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) [ 554.612843][ T2703] CPU: 1 PID: 2703 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 554.621593][ T2703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.631679][ T2703] Call Trace: [ 554.634982][ T2703] dump_stack+0x141/0x1d7 [ 554.639350][ T2703] should_fail.cold+0x5/0xa [ 554.643978][ T2703] _copy_to_user+0x2c/0x150 [ 554.648518][ T2703] simple_read_from_buffer+0xcc/0x160 [ 554.653932][ T2703] proc_fail_nth_read+0x187/0x220 16:43:39 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') [ 554.658996][ T2703] ? proc_exe_link+0x1d0/0x1d0 [ 554.663792][ T2703] ? security_file_permission+0x248/0x560 [ 554.669851][ T2703] ? proc_exe_link+0x1d0/0x1d0 [ 554.674665][ T2703] vfs_read+0x1b5/0x570 [ 554.678861][ T2703] ksys_read+0x12d/0x250 [ 554.683162][ T2703] ? vfs_write+0xa30/0xa30 [ 554.687751][ T2703] ? syscall_enter_from_user_mode+0x27/0x70 [ 554.693695][ T2703] do_syscall_64+0x3a/0xb0 [ 554.698146][ T2703] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 554.704070][ T2703] RIP: 0033:0x41935c [ 554.707991][ T2703] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 554.727631][ T2703] RSP: 002b:00007f4fde159170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 554.736080][ T2703] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 554.744169][ T2703] RDX: 000000000000000f RSI: 00007f4fde1591e0 RDI: 0000000000000003 [ 554.752369][ T2703] RBP: 00007f4fde1591d0 R08: 0000000000000000 R09: 0000000000000000 16:43:39 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') 16:43:39 executing program 0: syz_open_procfs$namespace(0x0, 0x0) [ 554.760373][ T2703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 554.768481][ T2703] R13: 0000000000a9fb1f R14: 00007f4fde159300 R15: 0000000000022000 16:43:39 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000)=[{0x1, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:39 executing program 4: syz_open_procfs$namespace(0x0, 0x0) 16:43:39 executing program 3: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:40 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:40 executing program 0: syz_open_procfs$namespace(0x0, 0x0) 16:43:40 executing program 1: getresuid(0x0, 0x0, 0x0) 16:43:40 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000)=[{0x1, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:40 executing program 4: syz_open_procfs$namespace(0x0, 0x0) 16:43:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:40 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:40 executing program 5: setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0xfffffffffffffdf5) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000)=[{0x1, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:40 executing program 0: syz_open_procfs$namespace(0x0, 0x0) 16:43:40 executing program 4: syz_open_procfs$namespace(0x0, 0x0) 16:43:40 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) 16:43:40 executing program 0: syz_open_procfs$namespace(0x0, 0x0) 16:43:40 executing program 1: getresuid(0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) 16:43:40 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x1, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:40 executing program 2: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:40 executing program 4: syz_open_procfs$namespace(0x0, 0x0) 16:43:40 executing program 0: syz_open_procfs$namespace(0x0, 0x0) 16:43:40 executing program 4: syz_open_procfs$namespace(0x0, 0x0) 16:43:40 executing program 1: accept(0xffffffffffffffff, &(0x7f0000000e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000f00)=0x80) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f40)={0x68, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004800) getresuid(0x0, 0x0, 0x0) 16:43:40 executing program 5: socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000)=[{0x1, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:40 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000000c0)={@desc={0x1, 0x0, @desc4}}) 16:43:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:40 executing program 0: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) 16:43:40 executing program 4: syz_open_procfs$namespace(0x0, 0x0) 16:43:40 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000000)={0x0, 0x4, 0xbf}, &(0x7f0000000040)={'enc=', 'pkcs1', ' hash=', {'sha224-arm64-neon\x00'}}, &(0x7f00000000c0)="f0a6c58d", &(0x7f0000000100)=""/191) getresuid(0x0, 0x0, 0x0) 16:43:41 executing program 5: socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000)=[{0x1, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:41 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) clock_getres(0x0, &(0x7f0000000000)) socket$can_j1939(0x1d, 0x2, 0x7) 16:43:41 executing program 0: getresuid(0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:41 executing program 4 (fault-call:0 fault-nth:0): syz_open_procfs$namespace(0x0, 0x0) 16:43:41 executing program 3: socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:41 executing program 1: getresuid(0x0, 0x0, 0x0) geteuid() r0 = syz_usb_connect(0x6, 0x97f, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x12, 0x4e, 0xb5, 0x40, 0x19d2, 0x1257, 0xc252, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x96d, 0x4, 0xf9, 0x9, 0x20, 0x3, [{{0x9, 0x4, 0x9b, 0x2, 0xf, 0xff, 0xff, 0xff, 0x7, [@cdc_ncm={{0xa, 0x24, 0x6, 0x0, 0x1, "cede09aef1"}, {0x5, 0x24, 0x0, 0x7}, {0xd, 0x24, 0xf, 0x1, 0xffff0001, 0x2, 0x2, 0x9}, {0x6, 0x24, 0x1a, 0x7, 0x1}, [@obex={0x5, 0x24, 0x15, 0x1ff}, @country_functional={0xc, 0x24, 0x7, 0xfd, 0xe482, [0x1, 0x8, 0x8]}]}], [{{0x9, 0x5, 0xd, 0x10, 0x3ff, 0x1, 0xff, 0x4, [@generic={0xf9, 0x6, "ab56a074cfaac65f8dd28bd5eca10fd8d8a2df4a14bf79e931a2bf615ae48e13b51b92530c772452b1e47c9704663cb0c0bc0410a4c1e00f2dd629b32d26d5081e7dbbd33a103ed89ce1f59013277012929e3a2f0f69fffc554774bc6827a70576fcbaff19dd3c971bee1f50de1ea631c55fe7c1c3558cf168cb8c226bc13193b5146c3638e10689d54856af4508d718f1c601a9ef92264e0134ef68eb80efceb8774387676ea2a174899d554df435d9ffde147248d5163d1a3fe11c2fbddeb23fab4e7546dba0ee304d748cac8ebb1da93f5a092ff35014104a27a727463b6052324a0f9c6ceb82eeeee9e3377832b72922fc0d7231d6"}]}}, {{0x9, 0x5, 0xd, 0x10, 0x20, 0x8, 0x3c, 0x9, [@generic={0xc0, 0x1, "1df5b12cd80fe1546ec5dc0eed04c99b217459c0512953c840320e7866b996ce6b8bcef406c1ec6406bbe15d6b64bb3d7a958647e08cdb574e25472051a37df8053188142ceeae7487be7371d1c8bcf2bf6a84fe51912d79919a837335995afd0411bce55d04bcf7ea07c7ffae98202d81461e928ff251b8fae6b2424d5c6aaded2f099317feda3f0c080347af9f8cae61af271553ac672c247b3aa5d2c656005ebfd6fb7ebcf88a57e2932b71bf780020423e8cba1a853d6aeed0d02939"}, @uac_iso={0x7, 0x25, 0x1, 0xc2, 0xff, 0x101}]}}, {{0x9, 0x5, 0xa, 0x0, 0x3ff, 0xa8, 0xeb, 0x0, [@generic={0xf2, 0x10, "ef4f27b4f2efa348c0c6dca3ebc7fb2602a38201c9da336cde1313beccdd6258de033142bb268d3243cfb070a0f93496981cfbd89d6ae5965828aec13c0bf1c285f3372d5027f9eba7ad232e53e5a74161edcfcdf88847375ca373871d4da3f898b46c23818508bed6241916f2026a4e6da61a09cd9cace8d72c85c2d35aa81b27b00dae25f20a258adf2f52fbc114a01c25b638094f7608ff9cf714491788562d8c5067664502b7d1c0c0e6a6de7c6607c1dda3b94ead6e84943d4b9b6ce174d142ce87bb754cf55aa6718f012b8ad2e273f0da228e5b9a73e2d219d01710dcde38c32f006898bbecd1bab9284429b3"}]}}, {{0x9, 0x5, 0x4, 0x1, 0x3ff, 0x3f, 0x8, 0x80}}, {{0x9, 0x5, 0x0, 0x10, 0x3ff, 0x1f, 0x8, 0x9, [@generic={0xc, 0x22, "1008262e4f2e58646795"}]}}, {{0x9, 0x5, 0xc, 0x0, 0x200, 0x4, 0x9, 0x3}}, {{0x9, 0x5, 0x3, 0x0, 0x3df, 0x7f, 0x9, 0xff, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x4, 0xffff}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x9b, 0x7}]}}, {{0x9, 0x5, 0xa, 0x10, 0x10, 0x7, 0x4, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x2, 0x800}, @generic={0x3b, 0xe, "31351deae14d2fe62a91a24a136e817a7f3f26308b9ff0537ca23d8db328ba18e81b2531cba5a3d52adc6f1278cf7b0d6d8f1522ef5a93cef2"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x10, 0x4, 0x0, 0x1, [@generic={0x3f, 0x5, "a0f931203803cd7add269cd9a9949f73a4bf64e1d81920f2a810ca21c3840639cbb978bce0e6348401336343858d70246b060e476f98769c7197fe702a"}, @generic={0xc, 0x8, "5be2b614697c4f0730e9"}]}}, {{0x9, 0x5, 0x4, 0x8, 0x3ff, 0x1f, 0x1, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x2, 0x4578}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x16}]}}, {{0x9, 0x5, 0xf, 0x10, 0x20, 0x4, 0x5, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x1c, 0x3ff}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x80, 0x800}]}}, {{0x9, 0x5, 0x1, 0x10, 0x20, 0x38, 0x20, 0x8a, [@generic={0x2d, 0x5, "a41502c547a2cf3f8fe59c760ac4c93e5bd348b0e5f82570df7a62eb1a60cf10ec49adee7656ac2ffc4d65"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x1f, 0x8000}]}}, {{0x9, 0x5, 0x0, 0x0, 0x3ff, 0xbd, 0x9, 0x0, [@generic={0x56, 0x2e, "f3e2a9f9a3d2871be5c0158a185d247ff75df708dedaf6f5434a46efe282e42f55ef028a92b45b399c5d25d3ee43fd28c0651bf1a565f965b1757004b3b63fe0cb9962382ab99e5d17cbda1f41450c59972cfb6b"}, @generic={0xe5, 0x10, "fecb21de190d838835f7133064e4fc21072fb67db8b9914b7264e525ec77f8b831aa2a01b9e5e6b7e296c54734e0e75e4e4918cd14e61b8794ca468d6537f54ce2cc724f9ec5dcb25a8004135688ce4f4c4f8cdbba966e3c9f016c9c490a259e1effa3403c2396e0f6dd135392f151f29d09ca6996bebcef3caa0168bc2361acade9df23b26565e176466d766bb4462d9b49f6c111add239eb814de32cc48dbe03efb399ec978f9bb5ac470db4580ac49ee610a414f9f1f0693b49248d7dbe85b55dc65d9e314a02f3634272fa07a738d5bad4b930b1d1b99efc30ab41cd471af2c475"}]}}, {{0x9, 0x5, 0xa, 0x1, 0x40, 0x9, 0xf7, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x83, 0x4, 0x100}, @generic={0x29, 0xa, "46af5535caf408595c417e07482489f699a6f08480e4199b0cc5c5778934da66618c5f4491df87"}]}}, {{0x9, 0x5, 0x6, 0xd, 0x78, 0x3f, 0x81, 0xa4, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0xa3, 0x4}]}}]}}, {{0x9, 0x4, 0x4f, 0x0, 0xa, 0x4a, 0x89, 0x87, 0x3f, [@uac_control={{0xa, 0x24, 0x1, 0x2, 0x20}, [@processing_unit={0xb, 0x24, 0x7, 0x3, 0x6, 0x1, "5c8f2327"}, @mixer_unit={0x5, 0x24, 0x4, 0x6}, @selector_unit={0xa, 0x24, 0x5, 0x2, 0x8, "5907ba3d82"}, @output_terminal={0x9, 0x24, 0x3, 0x4, 0x306, 0x4, 0x4}, @output_terminal={0x9, 0x24, 0x3, 0x1, 0x307, 0x1, 0x5, 0x80}]}, @generic={0xbb, 0x2, "fdef312791f1323caba0899e381f87f037b3a8dd2bea116c736b17a135e3ce6cf6936914adccf87dd681819f2a0c953270f1c2022746d40c1745ebb06a614f917ab2a681a4f9a43b24fd41d926c2152526a72a4cccd58000d845be0399feafc42efd41b9d14ddb3edf707534daefa8901c5ec0ef35b8ce5f77128aafa8e377d6a501d70235befc65674c5ac7ebdb5188ba50b871c8e6b9f0bc28ecf5f12197f741e4d30f655c83627a95a685e53870fbc2afb93373acaafc9d"}], [{{0x9, 0x5, 0x8, 0x1, 0x10, 0x5, 0x0, 0xdd}}, {{0x9, 0x5, 0x80, 0x0, 0x8, 0x1, 0x8, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x7, 0x7fff}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x93, 0x6}]}}, {{0x9, 0x5, 0x3, 0x0, 0x400, 0x5, 0xff, 0xeb, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x7f, 0x8}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x1f, 0x4}]}}, {{0x9, 0x5, 0x1, 0xb66a919c2c1011d9, 0x3ff, 0x7, 0xe3, 0x1}}, {{0x9, 0x5, 0x3, 0x0, 0x200, 0x9, 0x0, 0x5, [@generic={0x3c, 0x2, "724bdfd99e3bb8f6a2c961d5eda8882193db9607192eba464729f7ad849d87a97849d02c97f5a18d50d2afc6e9763089c685aa2b1c8fbd463eaf"}]}}, {{0x9, 0x5, 0x1, 0xc, 0x3ff, 0x5, 0x1, 0x7f, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x7, 0x1}]}}, {{0x9, 0x5, 0x8, 0x1, 0x10, 0x3, 0x5, 0x5}}, {{0x9, 0x5, 0xd, 0x10, 0x3ff, 0x9, 0x7, 0x1}}, {{0x9, 0x5, 0xb, 0x2, 0x8, 0x5, 0x83, 0x20}}, {{0x9, 0x5, 0x9, 0x10, 0x400, 0x1, 0x1, 0xa9, [@generic={0x7f, 0x30, "20552f278baee49468e521fa8be102956ac4a9a89f02cbcb0c1aa10c130c5bfe3ad44c619f510b498e9ecc39faaf74163d13cd19fe566ecb3f97358c7b357ce2c50cfbb01158212d47033cf6798f8691ac2c50c28a50b161fbb4d7df75b70695ccd14cd6a9dce485d12a204d61535ef4e2fe209e89a17695778949dfda"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x3, 0x5}]}}]}}, {{0x9, 0x4, 0x95, 0x8, 0x1, 0x84, 0x9f, 0xcf, 0x8, [@cdc_ncm={{0x5}, {0x5, 0x24, 0x0, 0x292}, {0xd, 0x24, 0xf, 0x1, 0x3, 0xff, 0x9, 0x4}, {0x6}, [@obex={0x5, 0x24, 0x15, 0x7fff}, @acm={0x4, 0x24, 0x2, 0x8}, @mbim={0xc, 0x24, 0x1b, 0x8000, 0x2, 0x5, 0x8, 0xfd0f, 0x4}, @mdlm_detail={0xe7, 0x24, 0x13, 0xe8, "464de5e7c65090fa5abb7cef26e10cc9091a6e4460856937e65ba05e26b4bc20a8402720a5fd28168db69cd5fbb4a47dc71993a39536c766e8e066866feb9682c5faa7adf92a447175d48fe99d5515561016578b79679347a6dc609d976e9e71d909e8b29949f5bcbe230ce316ef2bb533e18a86423264387daea5449026042e000fec88de00369ae158212a732666726e4e6054ac7c8c392ae459c406f5589604c69ad4cd5aa0a0e13f844167466a9d787990bb3428b814d95dd5ea18eb3a370a9de939353c885b131e6798e1c5587fae06c195af1e17e54ada2282ba9982f5eb568b"}, @obex={0x5, 0x24, 0x15, 0xfeff}, @mdlm={0x15, 0x24, 0x12, 0xcf}]}], [{{0x9, 0x5, 0x7, 0x10, 0x200, 0x7, 0x0, 0xa4}}]}}, {{0x9, 0x4, 0x1a, 0x7, 0x0, 0x75, 0x40, 0xdd, 0x52}}]}}]}}, &(0x7f0000000bc0)={0xa, &(0x7f0000000980)={0xa, 0x6, 0x311, 0x7, 0xe1, 0x1, 0xff, 0x1}, 0x5, &(0x7f00000009c0)={0x5, 0xf, 0x5}, 0x4, [{0xcc, &(0x7f0000000a00)=@string={0xcc, 0x3, "554a52eb543f4a5cef46ddc66442f347aea38498a02f7715e432bfc6a3e6f40c0b9c9a372164e2e59518a302acf81e9b9f23dffc2eee34debb393abefbee63d512717daa3f26720b5fd1a3bba55e7f76992f44d69e4e8b63a7b4c4503ec4850bd27126fff049879b043d2ba46dbd69d229779b3e1ddfae519ad92c3dbdb9e1023cf4512ab8e7a3b29aa8a85d4fb257feb0e752ea2112bd6e753e899b5fc4849262643fcb17baeec292735ae6a53dd3694863ef4c112fc4daf4a84b66e09cc5afae47b8b30492699c6138"}}, {0x4, &(0x7f0000000b00)=@lang_id={0x4, 0x3, 0x403}}, {0x4, &(0x7f0000000b40)=@lang_id={0x4, 0x3, 0x446}}, {0x30, &(0x7f0000000b80)=@string={0x30, 0x3, "808bf90c571c6fba4e5d4ebfc67ba5ac33e1b8448803f01fc8a2699356491c6c814961c42f1a208694b419baf41f"}}]}) syz_usb_disconnect(r0) 16:43:41 executing program 5: socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000)=[{0x1, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:41 executing program 2: getresuid(&(0x7f0000000080), &(0x7f0000000040), 0x0) [ 556.313711][ T2808] FAULT_INJECTION: forcing a failure. [ 556.313711][ T2808] name failslab, interval 1, probability 0, space 0, times 0 [ 556.351640][ T2808] CPU: 0 PID: 2808 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 556.360565][ T2808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.370749][ T2808] Call Trace: [ 556.374060][ T2808] dump_stack+0x141/0x1d7 [ 556.378957][ T2808] should_fail.cold+0x5/0xa [ 556.383508][ T2808] ? getname_flags.part.0+0x50/0x4f0 [ 556.388964][ T2808] should_failslab+0x5/0x10 [ 556.393676][ T2808] kmem_cache_alloc+0x5e/0x3a0 [ 556.398493][ T2808] getname_flags.part.0+0x50/0x4f0 [ 556.403651][ T2808] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 556.409736][ T2808] getname+0x8e/0xd0 [ 556.413970][ T2808] do_sys_openat2+0xf5/0x420 [ 556.418691][ T2808] ? build_open_flags+0x6f0/0x6f0 [ 556.423846][ T2808] ? __context_tracking_exit+0xb8/0xe0 [ 556.429402][ T2808] ? lock_downgrade+0x6e0/0x6e0 [ 556.434316][ T2808] __x64_sys_openat+0x13f/0x1f0 [ 556.439207][ T2808] ? __ia32_sys_open+0x1c0/0x1c0 [ 556.444197][ T2808] ? syscall_enter_from_user_mode+0x27/0x70 [ 556.450152][ T2808] do_syscall_64+0x3a/0xb0 [ 556.454611][ T2808] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 556.460546][ T2808] RIP: 0033:0x4196c4 [ 556.464472][ T2808] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 556.484491][ T2808] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 556.492962][ T2808] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 556.501092][ T2808] RDX: 0000000000000002 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c 16:43:41 executing program 3: socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:41 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, 0x0, 0x0) 16:43:41 executing program 0: getresuid(0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) [ 556.509182][ T2808] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 556.519186][ T2808] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 556.527189][ T2808] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 [ 556.535435][ C0] vkms_vblank_simulate: vblank timer overrun 16:43:41 executing program 3: socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) 16:43:41 executing program 0: getresuid(0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:41 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, 0x0, 0x0) 16:43:41 executing program 2: r0 = socket(0x6, 0x80000, 0x100) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) bind$pptp(r1, &(0x7f0000000ac0)={0x18, 0x2, {0x0, @remote}}, 0x1e) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f00000000c0)={0x384, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x124, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xc, 0x3, "9d9596b56c07f1e9"}, @TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "ad30f605bd2e1f606933fb6b95c58bce5b74251d759db907472f1b242f6934cc7c02"}}, @TIPC_NLA_NODE_ID={0x21, 0x3, "84c186d0b639724b673f98ad81e96f6bfddbedaee60025122ccdae52fd"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ID={0x9b, 0x3, "e07d59bf61ee5faafb4b747b931358c151b05693b9908e8ed86fe45bc326faa6f0c7168d9aea7531cb65837cb8966792f6f2ffa68ee61cbcabeb67ed5fb11cd1bbd558784d992c703ca4cba74f944e185b43700692bc0bed7208cac8f626fe9777b7ea9b5dcdae9b43e7dc263b975600009384ee003b7f1c278f23882f51e5c2f3ad1855501c84451742ff959b3988f26b57a6956424dc"}]}, @TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4000000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff8}]}, @TIPC_NLA_LINK={0x16c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x97bf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe874}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa28d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb9fa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8d5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe8b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3bb}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7e}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}]}]}, 0x384}, 0x1, 0x0, 0x0, 0x40048}, 0x44004) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x64e000, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f00000006c0)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, r2, 0x0, &(0x7f0000000680)='./file0\x00', 0x150, 0x107040, 0x23456}, 0x0) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r3 = inotify_init1(0x800) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x101) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r4 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000500)='.log\x00', 0x2000, 0x108) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@GTPA_TID={0xc, 0x3, 0x3}, @GTPA_I_TEI={0x8, 0x8, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x44080080}, 0x1c) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000a80)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2200000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000740)={0x2ec, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x2c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_BEARER={0xfc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4deb709f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6385}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffff80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0xc4, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xa87}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xa7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffd}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x97}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9b}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7c}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_BEARER={0x90, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3f}}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'ib', 0x3a, 'veth0_to_bond\x00'}}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}]}]}, 0x2ec}, 0x1, 0x0, 0x0, 0x40080}, 0x0) 16:43:41 executing program 4 (fault-call:0 fault-nth:1): syz_open_procfs$namespace(0x0, 0x0) 16:43:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, 0x0, 0x0) [ 557.027193][ T2838] FAULT_INJECTION: forcing a failure. [ 557.027193][ T2838] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 557.059949][ T2838] CPU: 1 PID: 2838 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 557.068900][ T2838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.079324][ T2838] Call Trace: [ 557.082630][ T2838] dump_stack+0x141/0x1d7 [ 557.086996][ T2838] should_fail.cold+0x5/0xa [ 557.091543][ T2838] strncpy_from_user+0x34/0x3e0 [ 557.096598][ T2838] getname_flags.part.0+0x95/0x4f0 [ 557.101752][ T2838] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 557.107794][ T2838] getname+0x8e/0xd0 [ 557.111700][ T2838] do_sys_openat2+0xf5/0x420 [ 557.116378][ T2838] ? build_open_flags+0x6f0/0x6f0 [ 557.121524][ T2838] ? __context_tracking_exit+0xb8/0xe0 [ 557.127074][ T2838] ? lock_downgrade+0x6e0/0x6e0 [ 557.131935][ T2838] __x64_sys_openat+0x13f/0x1f0 [ 557.136847][ T2838] ? __ia32_sys_open+0x1c0/0x1c0 [ 557.141837][ T2838] ? syscall_enter_from_user_mode+0x27/0x70 [ 557.147781][ T2838] do_syscall_64+0x3a/0xb0 [ 557.152211][ T2838] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 557.158107][ T2838] RIP: 0033:0x4196c4 [ 557.162000][ T2838] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 557.181821][ T2838] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 557.190263][ T2838] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 557.198669][ T2838] RDX: 0000000000000002 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c [ 557.206941][ T2838] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 557.215002][ T2838] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 557.222971][ T2838] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 16:43:42 executing program 4 (fault-call:0 fault-nth:2): syz_open_procfs$namespace(0x0, 0x0) 16:43:42 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, 0x0, 0x0) 16:43:42 executing program 0: getresuid(0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:42 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/86, 0x56}, {&(0x7f0000000140)=""/183, 0xb7}], 0x2, &(0x7f0000000200)=""/103, 0x67}, 0x40000000) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, 0x0, 0x0) 16:43:42 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000040)={r1, 0xc6, 0xc6}, &(0x7f0000002100)=ANY=[@ANYBLOB="656e633d6f61657020686173683d736d33000000000000000000000000b8fe10755d2003d70000bd01359a00000000000000060000000000ddffffffffffffff000000000000"], &(0x7f0000002180)="c1e28fe17215fc273659ca3ee0e11bb4b1f389cb1e4daa7a396e47a1b8ab2562a7c3e1fd7e4faa304bdfeeb35ec24bb3a682e073b16b6f74a25fc1b3b957bf4b691cf0096f80145d327f2e0244c9484b360f763953e565950dc7f3ff66c7231a46da65f60b724a1a4b8e1103f640cbbfb766bcae60f69c40075d37813a535a71561366cb4fbcb9fe534ba142badd736f89e2b554241668dace1753016a9d90981cf24678ae37c448789a52127b296caf0d0959f306aadd488dfa7f6a4d8f28579d3889c20861", &(0x7f0000002280)=""/198) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) getgid() read$FUSE(r0, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getuid() read$FUSE(r0, &(0x7f0000002500)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004600)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r6 = getgid() getresuid(&(0x7f0000006640)=0x0, &(0x7f0000006680), &(0x7f00000066c0)) r8 = getgid() read$FUSE(r0, &(0x7f0000007180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f00000098c0)=ANY=[@ANYBLOB="60060000000a526c7f12819893ce9cad6f26beb87d3fff12b3e325c117a507a13ac5cff35930c9d96927ca49459e7a3b3664402325a355e3605df1d9499fc786d3bc930dea2f897e35468ad3dbcac96cf956e66a8cf8bb656b552bc1898398a852e2a6109087d86e6846f5d8b09a9545474ba4bcca7caad6715ace35a82841cab71ae8f868441427e9082c0b8fcf241deaafd484118e046ce08b161c97d4f8297f02df1e09a13a8fa378790acb95ace471fe0d55f19d9fa143a882b55ff778c64885ff60898277e2af490f10dfaab5c8b623d9336ed6bb9f15b69a0767e5a5aeaa36d707b6fe5c300cc0baecb5e61fa401fbb2ba6710be22088a61599901c851cd25f2aa9458f31d15", @ANYRES64=0x0, @ANYBLOB="04000000000000000200000000000000c4000000000000001f0000000000000008000000000000000300000000000000f8ffffffffffffff8a00000000000000f10a00000000000007000000000000004c000000000000007f230000050000000800000000a00000ff000000", @ANYRES32=0x0, @ANYRESHEX=r4, @ANYBLOB="07000000040000000000000004000000000000000200000000000000060000000400000023212c5e2f2f000001000000000000000300000000000000630000000000000000000000000000003e400000000200000200000000000000800000000000000002000000000000000000008000000000040000000000000006000000000000000600000002000000080000000020000005000000", @ANYRES16=r6, @ANYRES32=r2, @ANYBLOB="08000000e6000000000000000200000000000000040000000000000009000000000000007b5b2e2a297d2c5c250000000000000006000000000000000200000000000000050000000000000080ffffffffffffff00000000070000000600000000000000c8000000000000000200000000000000f800000000000000070000000000000000000000000000000800000001000000620a000000c0000058070000", @ANYBLOB="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", @ANYRES32, @ANYBLOB="000400000ade0000000000000100000000000000ff0100000000000008000000db0600006b657972696e6700050000000000000001000000000000000700000000000000060000000000000000040000ff0000000100000000000000020000000000000000000000000000000300000000000000ff0700000000000000000000000000004000000020000000db4e937c00c0000001000000", @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="0900000001000100000000000100000000000000040000000097c7dad4a1eb0100000004000000010000002c2d402d00000000020000000000000001000000000000000000000000000000090000000000000085010000020000000600000000000000b28900000000008006000000000000000000000000000000fd04000000000000010400000000000007000000010000000400000000c00000e5030000", @ANYRES32=0xee01, @ANYRES32=r6, @ANYBLOB="0200000008000000000000000300000000000000810a00000000000001000000000000000000000000000000060000000000000002000000000000002a3c000000000000010000000000000056ffffff010000000400000000000000030000000000000046ffffffffffffff0000000000000000a7ffffffffffffff0100000000000000000000003e320000ffffffff0020000000000000", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYRESOCT=r7, @ANYRES32=r7, @ANYRES32, @ANYBLOB="0400000006000000000000000300000000000000110300000000000000000000000000000300000000000000010000000000000007000000000000001f0d0000000000000010000003000000010000000000000007000000000000001900000000000000ff0000000000000001040000000000000100000000000000070000008d0c0000010000000040000001000000", @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="0000000001000000000000000100000000000000000000000000000013000000010000002f6465762f62747266732d636f6e74726f6c00000000000001000000000000000300000000000000ffff00000000000007000000000000003f000000070000000200000000000000060000000000000005000000000000000400000000000000400000000000000000000000000000000400000003000000ff01000000a00000b2000000", @ANYRES32, @ANYRES32=r9, @ANYBLOB="00000000af0000000000000003000000000000000300000000000000080000007c0000006b657972696e6700000000000000000001000000000000000004000000000000464f0000000000000100000008000000040000000000000003000000000000008e0000000000000000000000000000000400000000000000050000000000000003000000000020000800000000100000f2010000", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="04000000ff070000000000000100000000000000340000000000000002000000020000003a40000000000000"], 0x660) r10 = socket$pptp(0x18, 0x1, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SPLICE={0x1e, 0x5, 0x0, @fd=r0, 0x7ff4, {}, 0x9, 0xe, 0x1, {0x0, 0x0, r10}}, 0x5) 16:43:42 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000), 0x0) 16:43:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, 0x0, 0x0) 16:43:42 executing program 0: getresuid(0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020}, 0x2020) [ 557.427493][ T2853] FAULT_INJECTION: forcing a failure. [ 557.427493][ T2853] name failslab, interval 1, probability 0, space 0, times 0 [ 557.486953][ T2854] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 557.493662][ T2854] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 557.494648][ T2853] CPU: 1 PID: 2853 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 557.510009][ T2853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.520090][ T2853] Call Trace: [ 557.523434][ T2853] dump_stack+0x141/0x1d7 [ 557.527803][ T2853] should_fail.cold+0x5/0xa [ 557.532058][ T2854] vhci_hcd vhci_hcd.0: Device attached [ 557.532344][ T2853] ? __alloc_file+0x21/0x280 [ 557.532380][ T2853] should_failslab+0x5/0x10 [ 557.547028][ T2853] kmem_cache_alloc+0x5e/0x3a0 [ 557.551837][ T2853] __alloc_file+0x21/0x280 [ 557.556462][ T2853] alloc_empty_file+0x6d/0x170 [ 557.561263][ T2853] path_openat+0xe3/0x27e0 [ 557.565714][ T2853] ? __lock_acquire+0x16a7/0x5230 [ 557.570788][ T2853] ? path_lookupat+0x850/0x850 [ 557.575608][ T2853] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 557.581675][ T2853] do_filp_open+0x190/0x3d0 [ 557.586567][ T2853] ? may_open_dev+0xf0/0xf0 [ 557.591113][ T2853] ? alloc_fd+0x2e6/0x660 [ 557.595614][ T2853] ? lock_downgrade+0x6e0/0x6e0 [ 557.600499][ T2853] ? do_raw_spin_lock+0x120/0x2b0 [ 557.605536][ T2853] ? rwlock_bug.part.0+0x90/0x90 [ 557.610587][ T2853] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 557.616941][ T2853] ? _find_next_bit+0x1e3/0x260 [ 557.621803][ T2853] ? _raw_spin_unlock+0x24/0x40 [ 557.626771][ T2853] ? alloc_fd+0x2e6/0x660 [ 557.631103][ T2853] do_sys_openat2+0x16d/0x420 [ 557.635778][ T2853] ? build_open_flags+0x6f0/0x6f0 [ 557.640821][ T2853] ? __context_tracking_exit+0xb8/0xe0 [ 557.646285][ T2853] ? lock_downgrade+0x6e0/0x6e0 [ 557.651158][ T2853] __x64_sys_openat+0x13f/0x1f0 [ 557.656006][ T2853] ? __ia32_sys_open+0x1c0/0x1c0 [ 557.660946][ T2853] ? syscall_enter_from_user_mode+0x27/0x70 [ 557.666845][ T2853] do_syscall_64+0x3a/0xb0 [ 557.671261][ T2853] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 557.677152][ T2853] RIP: 0033:0x4196c4 [ 557.681047][ T2853] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 557.700824][ T2853] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 557.709426][ T2853] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 557.717486][ T2853] RDX: 0000000000000002 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c [ 557.725460][ T2853] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 16:43:42 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000080), 0x0) [ 557.733427][ T2853] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 557.741391][ T2853] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 [ 557.751520][ T2855] vhci_hcd: connection closed [ 557.767394][ T132] vhci_hcd: stop threads 16:43:42 executing program 1: connect$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x1a, 0x0, 0x1, 0x4, 0x6, @random="b62993e1832e"}, 0x14) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @local}, 0x10) getresuid(0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd_index=0x7, 0x344, 0x0, 0x8000, 0x4, 0x1}, 0x81) connect$can_j1939(0xffffffffffffffff, &(0x7f00000000c0)={0x1d, 0x0, 0x2, {0x0, 0xf0, 0x4}, 0x1}, 0x18) 16:43:42 executing program 0: getresuid(0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020}, 0x2020) [ 557.791902][ T132] vhci_hcd: release socket [ 557.810786][ T132] vhci_hcd: disconnect device 16:43:43 executing program 4 (fault-call:0 fault-nth:3): syz_open_procfs$namespace(0x0, 0x0) 16:43:43 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, 0x0) r1 = getuid() r2 = getuid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000000c0)={0x1f0, 0x0, 0x0, [{{0x4, 0x3, 0xffffffffffffffff, 0x5, 0x75, 0xfffffc00, {0x4, 0x2, 0x1, 0xff, 0x4b5, 0x8, 0x480, 0x3ff, 0x20, 0xa000, 0x10000, r1, 0xee00, 0x3ff, 0xffffe508}}, {0x5, 0xfffffffffffffbff, 0x5, 0x3, 'Y*!+&'}}, {{0x2, 0x0, 0x7f4, 0xb0, 0x1, 0x3, {0x2, 0x1, 0x9, 0x80, 0xffffffff, 0x8001, 0x1, 0x2800000, 0x6, 0x4000, 0x7, r2, 0xee01, 0x80000001, 0x5}}, {0x6, 0x5, 0x5, 0x8, '&@(*-'}}, {{0x1, 0x0, 0x2, 0x80d2, 0x9d, 0x100, {0x1, 0x48d, 0x1, 0x8, 0x5, 0x0, 0xfffffff9, 0x8001, 0x4, 0x6000, 0x6, r0, 0x0, 0x1, 0x401}}, {0x2, 0x0, 0x3, 0xfffffc00, '$-@'}}]}, 0x1f0) 16:43:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), 0x4) 16:43:43 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000), 0x0) 16:43:43 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:43 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:43 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000), 0x0) 16:43:43 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000), 0x0) 16:43:43 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) 16:43:43 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000000)={@desc={0x1, 0x0, @desc3}}) getresuid(0x0, 0x0, 0x0) 16:43:43 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) [ 558.225816][ T2886] FAULT_INJECTION: forcing a failure. [ 558.225816][ T2886] name failslab, interval 1, probability 0, space 0, times 0 [ 558.283900][ T2886] CPU: 0 PID: 2886 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 558.292676][ T2886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.302766][ T2886] Call Trace: [ 558.306075][ T2886] dump_stack+0x141/0x1d7 [ 558.310454][ T2886] should_fail.cold+0x5/0xa [ 558.315004][ T2886] ? security_file_alloc+0x34/0x170 [ 558.320246][ T2886] should_failslab+0x5/0x10 [ 558.324789][ T2886] kmem_cache_alloc+0x5e/0x3a0 [ 558.329603][ T2886] security_file_alloc+0x34/0x170 [ 558.334692][ T2886] __alloc_file+0xd8/0x280 [ 558.339156][ T2886] alloc_empty_file+0x6d/0x170 [ 558.344050][ T2886] path_openat+0xe3/0x27e0 [ 558.348518][ T2886] ? __lock_acquire+0x16a7/0x5230 [ 558.353591][ T2886] ? path_lookupat+0x850/0x850 [ 558.358405][ T2886] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 558.364439][ T2886] do_filp_open+0x190/0x3d0 [ 558.368985][ T2886] ? may_open_dev+0xf0/0xf0 [ 558.373539][ T2886] ? alloc_fd+0x2e6/0x660 [ 558.378000][ T2886] ? lock_downgrade+0x6e0/0x6e0 [ 558.382889][ T2886] ? do_raw_spin_lock+0x120/0x2b0 [ 558.387948][ T2886] ? rwlock_bug.part.0+0x90/0x90 [ 558.392925][ T2886] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 558.399214][ T2886] ? _find_next_bit+0x1e3/0x260 [ 558.404116][ T2886] ? _raw_spin_unlock+0x24/0x40 [ 558.409266][ T2886] ? alloc_fd+0x2e6/0x660 [ 558.413729][ T2886] do_sys_openat2+0x16d/0x420 [ 558.418443][ T2886] ? build_open_flags+0x6f0/0x6f0 [ 558.423509][ T2886] ? __context_tracking_exit+0xb8/0xe0 [ 558.429012][ T2886] ? lock_downgrade+0x6e0/0x6e0 16:43:43 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000), 0x0) [ 558.433968][ T2886] __x64_sys_openat+0x13f/0x1f0 [ 558.438852][ T2886] ? __ia32_sys_open+0x1c0/0x1c0 [ 558.443832][ T2886] ? syscall_enter_from_user_mode+0x27/0x70 [ 558.449773][ T2886] do_syscall_64+0x3a/0xb0 [ 558.454235][ T2886] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 558.460317][ T2886] RIP: 0033:0x4196c4 [ 558.464244][ T2886] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 558.483883][ T2886] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 558.494155][ T2886] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 558.502159][ T2886] RDX: 0000000000000002 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c [ 558.510293][ T2886] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 558.518345][ T2886] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 558.526475][ T2886] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 [ 558.534647][ C0] vkms_vblank_simulate: vblank timer overrun 16:43:43 executing program 4 (fault-call:0 fault-nth:4): syz_open_procfs$namespace(0x0, 0x0) 16:43:43 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x0, 0x8, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:43 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000000)) 16:43:43 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180), 0x8002, 0x0) read$midi(r0, &(0x7f00000001c0)=""/4096, 0x1000) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) getuid() write$midi(r0, &(0x7f00000011c0)="0ce74c81cd6cfb073b470e8290ebd2f393e5383d8cb5a042e7b64dc92259e4e78428608976cc5c923340d4d3eacd38d4ede66ba68484984dc5107ed09b9a6bb8eeafe285c2d30bf3791968dabbeeaf6274c30b7cc34ebea45e1b3da5e4581bbbe32c98eadedee6c29be46df8d7132c8c7471131fc3735ea82024cca7adfc6f81890c2aad82a85250b3a1d0a61e97ac09f349a88281c1288cb0de0862a4f0cada5b9bf6f2710101c1cda7b2aa205ee10c7ed917", 0xb3) r1 = add_key$fscrypt_v1(&(0x7f0000001280), &(0x7f00000012c0)={'fscrypt:', @auto=[0x32, 0x35, 0x62, 0x32, 0x34, 0x39, 0x32, 0x63, 0x6f, 0x30, 0x62, 0x66, 0x38, 0x37, 0x67, 0x33]}, &(0x7f0000001300)={0x0, "6872ba88dcfbf0249b99a921bb7b3ded9f44985e6ac69c2427c5b6f1125a21ec3b2d6096847761bb35162c01aeba1e4afdaa268315f69d38196b4a258cc37999", 0x18}, 0x48, 0x0) keyctl$assume_authority(0x10, r1) getresuid(&(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_FALLOCATE={0x11, 0x5, 0x0, @fd_index=0x7, 0x2, 0x0, 0xffffffc1, 0x0, 0x1}, 0x2) 16:43:43 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000), 0x0) 16:43:43 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:43 executing program 1: getresuid(0x0, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x8, 0x25dfdbfb, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @multicast1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000c045}, 0x40000) 16:43:43 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x0, 0x0, {0x3, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:43 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:43 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) getuid() [ 558.811208][ T2916] FAULT_INJECTION: forcing a failure. [ 558.811208][ T2916] name failslab, interval 1, probability 0, space 0, times 0 [ 558.880310][ T2916] CPU: 1 PID: 2916 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 558.889082][ T2916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.899166][ T2916] Call Trace: [ 558.902477][ T2916] dump_stack+0x141/0x1d7 [ 558.906847][ T2916] should_fail.cold+0x5/0xa [ 558.911395][ T2916] ? proc_self_get_link+0x187/0x1f0 [ 558.916625][ T2916] should_failslab+0x5/0x10 [ 558.921237][ T2916] kmem_cache_alloc_trace+0x55/0x2c0 [ 558.926688][ T2916] proc_self_get_link+0x187/0x1f0 [ 558.931881][ T2916] ? proc_ns_dir_lookup+0x2b0/0x2b0 [ 558.937121][ T2916] step_into+0x1483/0x1c80 [ 558.941586][ T2916] ? lookup_open.isra.0+0x13d0/0x13d0 [ 558.947000][ T2916] ? try_to_unlazy_next+0x470/0x470 [ 558.952247][ T2916] ? projid_m_show+0x220/0x220 [ 558.957047][ T2916] ? walk_component+0x109/0x6a0 [ 558.961938][ T2916] walk_component+0x171/0x6a0 [ 558.966656][ T2916] ? handle_dots.part.0+0x15d0/0x15d0 [ 558.972074][ T2916] ? make_kuid+0x1e/0x30 [ 558.976353][ T2916] ? generic_permission+0x126/0x5b0 [ 558.981718][ T2916] ? security_inode_permission+0xc5/0xf0 [ 558.987385][ T2916] link_path_walk.part.0+0x712/0xc90 [ 558.992702][ T2916] ? walk_component+0x6a0/0x6a0 [ 558.997561][ T2916] ? percpu_counter_add_batch+0xbd/0x180 [ 559.003278][ T2916] path_openat+0x25a/0x27e0 [ 559.007795][ T2916] ? path_lookupat+0x850/0x850 [ 559.012569][ T2916] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 559.018564][ T2916] do_filp_open+0x190/0x3d0 [ 559.023071][ T2916] ? may_open_dev+0xf0/0xf0 [ 559.027699][ T2916] ? rwlock_bug.part.0+0x90/0x90 [ 559.032634][ T2916] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 559.038890][ T2916] ? _find_next_bit+0x1e3/0x260 [ 559.043748][ T2916] ? _raw_spin_unlock+0x24/0x40 [ 559.048602][ T2916] ? alloc_fd+0x2e6/0x660 [ 559.052952][ T2916] do_sys_openat2+0x16d/0x420 [ 559.057763][ T2916] ? build_open_flags+0x6f0/0x6f0 [ 559.062800][ T2916] ? __context_tracking_exit+0xb8/0xe0 [ 559.068274][ T2916] ? lock_downgrade+0x6e0/0x6e0 [ 559.073140][ T2916] __x64_sys_openat+0x13f/0x1f0 [ 559.077995][ T2916] ? __ia32_sys_open+0x1c0/0x1c0 [ 559.083028][ T2916] ? syscall_enter_from_user_mode+0x27/0x70 [ 559.089119][ T2916] do_syscall_64+0x3a/0xb0 [ 559.093572][ T2916] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 559.099469][ T2916] RIP: 0033:0x4196c4 [ 559.103379][ T2916] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 16:43:44 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x0, 0x0, {0x0, 0x1, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:44 executing program 3: setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000), 0x0) [ 559.123458][ T2916] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 559.131880][ T2916] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 559.139889][ T2916] RDX: 0000000000000002 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c [ 559.147857][ T2916] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 559.155921][ T2916] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 559.163888][ T2916] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 16:43:44 executing program 4 (fault-call:0 fault-nth:5): syz_open_procfs$namespace(0x0, 0x0) 16:43:44 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)={0x400040, 0x24}, 0x18) r1 = openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x8000, 0x0) r2 = getgid() r3 = getuid() r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) read$midi(r4, &(0x7f00000004c0)=""/4096, 0x1000) r5 = getgid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000040)={0x470, 0x0, 0x0, [{{0x6, 0x2, 0x5, 0x400, 0xfffffff8, 0x0, {0x2, 0x8001, 0xfffffffffffffffb, 0xb42, 0x1f, 0x7, 0x2, 0x7, 0x8, 0xe4a2f812621fe77e, 0x4, 0xee00, r2, 0xec29, 0x1}}, {0x6, 0x1, 0x3, 0xfffff001, '.%@'}}, {{0x0, 0x3, 0x100000001, 0x39, 0x5, 0x0, {0x3, 0x8, 0x738000000000, 0x2a9, 0x0, 0x8000, 0x1ff, 0xfff, 0x6, 0x2000, 0xffffffff, 0x0, 0xee00, 0x7fffffff, 0xfff}}, {0x0, 0xfffffffffffeffff, 0x5, 0x6, '*-);('}}, {{0x0, 0x2, 0x9, 0x400, 0xb8, 0x3ff, {0x4, 0x6, 0x80000000, 0x101, 0x0, 0x7, 0xff, 0xffffffff, 0x1ff, 0x2000, 0x1, 0xee01, 0xffffffffffffffff, 0xffff, 0x9}}, {0x1, 0x4ad6, 0x7, 0xd1, ',$$}\']]'}}, {{0x6, 0x1, 0x9, 0x0, 0xfffffffd, 0x3, {0x0, 0x2, 0x1ff, 0x72fd223b, 0x2, 0x400, 0x5, 0xfffffffd, 0x80000001, 0x8000, 0x400, 0xffffffffffffffff, 0xee01, 0x1ff, 0xfffffffc}}, {0x4, 0x1, 0x2, 0x1, '$$'}}, {{0x3, 0x1, 0x5, 0x7, 0x1, 0x1, {0x2, 0x80000000, 0x5, 0x100000001, 0x8001, 0x8, 0x65e, 0x4, 0x3, 0x4000, 0x1000, r3, 0xffffffffffffffff, 0x9, 0x3}}, {0x5, 0x63, 0x2, 0xb6, '-@'}}, {{0x6, 0x0, 0x9, 0x5, 0x3, 0x5, {0x3, 0x0, 0x1, 0x80, 0x4, 0x180000, 0xfffffffc, 0x3, 0x10000, 0x8000, 0x1, 0x0, 0xee00, 0x9, 0x401}}, {0x1, 0x4, 0x6, 0x200, '-.^{.#'}}, {{0x1, 0x2, 0x1, 0x8000, 0x5, 0x1, {0x5, 0xc2b, 0x8001, 0x800, 0xde, 0x4080c77b, 0x3, 0x0, 0x1f, 0x1000, 0x2, 0x0, r5, 0xffffffc1, 0x80000000}}, {0x0, 0x4, 0x1, 0x1, '*'}}]}, 0x470) 16:43:44 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:44 executing program 2: ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x1010, 0xffffffffffffffff, 0x8000000) 16:43:44 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x0, 0x0, {0x0, 0x0, 0x3}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) 16:43:44 executing program 3: setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000), 0x0) 16:43:44 executing program 3: setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000), 0x0) 16:43:44 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020}, 0x2020) [ 559.532835][ T2944] FAULT_INJECTION: forcing a failure. [ 559.532835][ T2944] name failslab, interval 1, probability 0, space 0, times 0 16:43:44 executing program 2: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xa8, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ebe}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8065}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}, @TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x46}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1c00000}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x10}, 0x40) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:44 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x0, 0x0, {}, {0x0, 0xf0}, 0x102, 0x2}], 0x20) [ 559.628092][ T2944] CPU: 0 PID: 2944 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 559.637238][ T2944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.647415][ T2944] Call Trace: [ 559.652752][ T2944] dump_stack+0x141/0x1d7 [ 559.657939][ T2944] should_fail.cold+0x5/0xa [ 559.662498][ T2944] ? __d_alloc+0x2a/0x950 [ 559.667406][ T2944] should_failslab+0x5/0x10 [ 559.672276][ T2944] kmem_cache_alloc+0x5e/0x3a0 [ 559.677224][ T2944] __d_alloc+0x2a/0x950 [ 559.681443][ T2944] d_alloc+0x4a/0x230 [ 559.685488][ T2944] d_alloc_parallel+0xe9/0x1a00 [ 559.690392][ T2944] ? __d_lookup+0x3fd/0x710 [ 559.694958][ T2944] ? lock_downgrade+0x6e0/0x6e0 [ 559.699860][ T2944] ? find_held_lock+0x2d/0x110 [ 559.704899][ T2944] ? __d_lookup_rcu+0x6c0/0x6c0 [ 559.709918][ T2944] ? __d_lookup+0x41f/0x710 [ 559.714691][ T2944] ? d_lookup+0x14f/0x170 [ 559.719165][ T2944] lookup_open.isra.0+0x863/0x13d0 [ 559.724441][ T2944] ? lookup_fast+0x6d0/0x6d0 [ 559.729077][ T2944] ? flexcop_usb_probe.cold+0x2a3/0x8ff [ 559.735128][ T2944] ? flexcop_usb_probe.cold+0x2a3/0x8ff [ 559.740720][ T2944] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 559.747008][ T2944] ? __mnt_want_write+0x1bc/0x2a0 [ 559.752090][ T2944] path_openat+0x9b4/0x27e0 [ 559.756698][ T2944] ? path_lookupat+0x850/0x850 [ 559.763334][ T2944] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 559.769379][ T2944] do_filp_open+0x190/0x3d0 [ 559.773930][ T2944] ? may_open_dev+0xf0/0xf0 [ 559.778490][ T2944] ? simple_attr_release+0x40/0x40 [ 559.783647][ T2944] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 559.789976][ T2944] ? _find_next_bit+0x1e3/0x260 [ 559.794876][ T2944] ? _raw_spin_unlock+0x24/0x40 [ 559.799847][ T2944] ? alloc_fd+0x2e6/0x660 [ 559.804220][ T2944] do_sys_openat2+0x16d/0x420 [ 559.808933][ T2944] ? build_open_flags+0x6f0/0x6f0 [ 559.814348][ T2944] ? __context_tracking_exit+0xb8/0xe0 [ 559.819847][ T2944] ? lock_downgrade+0x6e0/0x6e0 [ 559.824748][ T2944] __x64_sys_openat+0x13f/0x1f0 [ 559.829632][ T2944] ? __ia32_sys_open+0x1c0/0x1c0 [ 559.834622][ T2944] ? syscall_enter_from_user_mode+0x27/0x70 [ 559.841182][ T2944] do_syscall_64+0x3a/0xb0 [ 559.845635][ T2944] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 559.851561][ T2944] RIP: 0033:0x4196c4 [ 559.855482][ T2944] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 559.875120][ T2944] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 559.885568][ T2944] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 559.893756][ T2944] RDX: 0000000000000002 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c [ 559.903845][ T2944] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 559.912023][ T2944] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 559.920044][ T2944] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 16:43:44 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) getuid() read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff8, 0x1) 16:43:44 executing program 1: sendmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002180)={&(0x7f0000002080)={0x1d, 0x0, 0x4, {0x0, 0xf0}, 0xff}, 0x18, &(0x7f0000002140)={&(0x7f00000020c0)="e0a93990d17eb78b60cb65c4aff086d1f45746b4889b4183ac06c9bef4d630554c334485da367f64b79ec5fed733526715135a3db6239661e41fb0fb06a88d1a6c28112a60ff27059c68bef686861b4369794a77e635cd6188a975e7417e1898adeb43db5ec3fe828600b38b6c7fbc079544", 0x72}, 0x1, 0x0, 0x0, 0x8011}, 0x80) getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000005000)={0x11, 0x0, 0x0}, &(0x7f0000005040)=0x14) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002200)={&(0x7f00000021c0)='./file0\x00'}, 0x10) connect$can_j1939(r0, &(0x7f0000005080)={0x1d, r1, 0x0, {0x2, 0xff, 0x1}}, 0x18) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:45 executing program 4 (fault-call:0 fault-nth:6): syz_open_procfs$namespace(0x0, 0x0) 16:43:45 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020}, 0x2020) 16:43:45 executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000), 0x0) 16:43:45 executing program 2: ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000040)={0x0, 0x2, 0xa4, &(0x7f0000000000)=0x9}) 16:43:45 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002340)=ANY=[@ANYBLOB="a8100000f5ffffff0c299c27d8366bbf314c46686d880225db7a111a86f03f91cad457afed08c56dfd47b73210902b2465b264ca7132158c6ea471a264453d9ba4ce463c35a079c87be1e6d92f5e928ecc863d33dac55c9ec800305882160a389ac8ed6eae3391587d1881c45a3c601349ef6f05c86b00adc72ddad0469a9558366e6035e40057f7e74d960ec870614577b27c5918e390ff2dd6f60a9704995bd41458bc6c26afb76e784e28b00bbc7d7ed42482112beb9f2b260dce18ec86d5171b6090972eff36265cd3c4dbb99ccb0465a28b7a8b890a9dfd10c8ed361709fd4892004bfe60daea0d1aaa0cb7b42c5b189dfb94971722c64ea33a6858d6264c1feb9a9db92b3166992e2757b2d5d27c3544eaf0e5dbb10c8f7be506f4fa0fa53bcb9d1748e5d3d49f7dcfab901c83b0200c70fdda8d42cdb4ea7ab0598982aa6064e49a48e17541639d7f8db0f4c341f84f3db636db6fa5355b9c233a0c836c4ab0a4132acfaafe4b0d5c52000395857ec12c00000000000000", @ANYRES64=r1, @ANYBLOB="020000000000000000000000000000007e2b0000000000000000010000000000030000007f00000001000000000000000100000000000000209fffffffffffff0300000000000000ff0100000000000019040000000000003f0000000f950000200000000060000004000000", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="010000000100000000000000060000000000000081000000000000000000000003000000"], 0xa8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FILES_UPDATE={0x14, 0x4, 0x0, 0x0, 0x38000000000000, &(0x7f0000000040)=[0xffffffffffffffff], 0x1}, 0x2d) 16:43:45 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x0, 0x0, {}, {}, 0x102, 0x2}], 0x20) [ 560.238746][ T2969] FAULT_INJECTION: forcing a failure. [ 560.238746][ T2969] name failslab, interval 1, probability 0, space 0, times 0 16:43:45 executing program 1: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x1, 0x40) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000040)={0xa000000c}) getresuid(0x0, 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x5, 0x5, &(0x7f0000000340)={[0x2]}, 0x8) r1 = accept(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000240)=0x80) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000380)={0x2, 0x9, 0x5, 0x400}, 0x8) r2 = accept(r0, &(0x7f0000000080)=@phonet, &(0x7f0000000100)=0x80) getsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000002c0)=0x3, 0x4) [ 560.313483][ T2969] CPU: 0 PID: 2969 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 560.322399][ T2969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.332490][ T2969] Call Trace: [ 560.335795][ T2969] dump_stack+0x141/0x1d7 [ 560.340172][ T2969] should_fail.cold+0x5/0xa [ 560.344857][ T2969] ? __d_alloc+0x2a/0x950 [ 560.349238][ T2969] should_failslab+0x5/0x10 [ 560.353775][ T2969] kmem_cache_alloc+0x5e/0x3a0 [ 560.358597][ T2969] __d_alloc+0x2a/0x950 [ 560.362892][ T2969] d_alloc+0x4a/0x230 [ 560.366913][ T2969] d_alloc_parallel+0xe9/0x1a00 [ 560.371991][ T2969] ? __d_lookup+0x3fd/0x710 [ 560.376539][ T2969] ? lock_downgrade+0x6e0/0x6e0 [ 560.381432][ T2969] ? find_held_lock+0x2d/0x110 [ 560.386357][ T2969] ? __d_lookup_rcu+0x6c0/0x6c0 [ 560.391263][ T2969] ? __d_lookup+0x41f/0x710 [ 560.395814][ T2969] ? d_lookup+0x14f/0x170 [ 560.400193][ T2969] lookup_open.isra.0+0x863/0x13d0 [ 560.405861][ T2969] ? lookup_fast+0x6d0/0x6d0 [ 560.410502][ T2969] ? flexcop_usb_probe.cold+0x2a3/0x8ff [ 560.416102][ T2969] ? flexcop_usb_probe.cold+0x2a3/0x8ff [ 560.421686][ T2969] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 560.427980][ T2969] ? __mnt_want_write+0x1bc/0x2a0 [ 560.433058][ T2969] path_openat+0x9b4/0x27e0 [ 560.438051][ T2969] ? path_lookupat+0x850/0x850 [ 560.442861][ T2969] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 560.449162][ T2969] do_filp_open+0x190/0x3d0 [ 560.453698][ T2969] ? may_open_dev+0xf0/0xf0 [ 560.458257][ T2969] ? simple_attr_release+0x40/0x40 [ 560.463426][ T2969] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 560.469704][ T2969] ? _find_next_bit+0x1e3/0x260 [ 560.474594][ T2969] ? _raw_spin_unlock+0x24/0x40 [ 560.479471][ T2969] ? alloc_fd+0x2e6/0x660 [ 560.484015][ T2969] do_sys_openat2+0x16d/0x420 [ 560.488727][ T2969] ? build_open_flags+0x6f0/0x6f0 [ 560.493782][ T2969] ? __context_tracking_exit+0xb8/0xe0 [ 560.499278][ T2969] ? lock_downgrade+0x6e0/0x6e0 [ 560.504169][ T2969] __x64_sys_openat+0x13f/0x1f0 [ 560.509052][ T2969] ? __ia32_sys_open+0x1c0/0x1c0 [ 560.514035][ T2969] ? syscall_enter_from_user_mode+0x27/0x70 [ 560.520003][ T2969] do_syscall_64+0x3a/0xb0 [ 560.524453][ T2969] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 560.530383][ T2969] RIP: 0033:0x4196c4 [ 560.534303][ T2969] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 560.554044][ T2969] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 16:43:45 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x0, 0x0, {}, {}, 0x0, 0x2}], 0x20) 16:43:45 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 16:43:45 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x80, 0x4, 0x400, 0xc, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x40) r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) keyctl$invalidate(0x15, r0) 16:43:45 executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000), 0x0) [ 560.562491][ T2969] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 560.570487][ T2969] RDX: 0000000000000002 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c [ 560.578490][ T2969] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 560.586492][ T2969] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 560.594491][ T2969] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 16:43:45 executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000), 0x0) 16:43:45 executing program 4 (fault-call:0 fault-nth:7): syz_open_procfs$namespace(0x0, 0x0) 16:43:45 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{}], 0x20) 16:43:45 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 16:43:45 executing program 1: getresuid(0x0, 0x0, 0x0) getuid() 16:43:45 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:45 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, 0x0, 0x0) 16:43:45 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, 0x0, 0x0) 16:43:46 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x6, 0xa4ab}) 16:43:46 executing program 2: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:46 executing program 5: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x80, 0x4, 0x400, 0xc, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x40) r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) keyctl$invalidate(0x15, r0) 16:43:46 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 561.068404][ T3013] FAULT_INJECTION: forcing a failure. [ 561.068404][ T3013] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 561.126539][ T3013] CPU: 0 PID: 3013 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 561.135309][ T3013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.145489][ T3013] Call Trace: [ 561.148796][ T3013] dump_stack+0x141/0x1d7 [ 561.153164][ T3013] should_fail.cold+0x5/0xa [ 561.157715][ T3013] strncpy_from_user+0x34/0x3e0 [ 561.162608][ T3013] getname_flags.part.0+0x95/0x4f0 [ 561.167759][ T3013] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 561.173785][ T3013] getname+0x8e/0xd0 [ 561.177723][ T3013] do_sys_openat2+0xf5/0x420 [ 561.182346][ T3013] ? build_open_flags+0x6f0/0x6f0 [ 561.187432][ T3013] ? __context_tracking_exit+0xb8/0xe0 [ 561.192939][ T3013] ? lock_downgrade+0x6e0/0x6e0 [ 561.198273][ T3013] __x64_sys_openat+0x13f/0x1f0 [ 561.203162][ T3013] ? __ia32_sys_open+0x1c0/0x1c0 [ 561.208144][ T3013] ? syscall_enter_from_user_mode+0x27/0x70 [ 561.214084][ T3013] do_syscall_64+0x3a/0xb0 [ 561.218543][ T3013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 561.224477][ T3013] RIP: 0033:0x4196c4 [ 561.228398][ T3013] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 561.248123][ T3013] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 561.256570][ T3013] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 561.264602][ T3013] RDX: 0000000000000000 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c 16:43:46 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, 0x0, 0x0) [ 561.272600][ T3013] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 561.280600][ T3013] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 561.288779][ T3013] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 16:43:46 executing program 4 (fault-call:0 fault-nth:8): syz_open_procfs$namespace(0x0, 0x0) 16:43:46 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000040)) 16:43:46 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 16:43:46 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{0x0, 0x0, {}, {}, 0x0, 0x2}], 0x20) 16:43:46 executing program 5: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x80, 0x4, 0x400, 0xc, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x40) r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) keyctl$invalidate(0x15, r0) 16:43:46 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000000), 0x0) 16:43:46 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:46 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:46 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 561.655550][ T3050] FAULT_INJECTION: forcing a failure. [ 561.655550][ T3050] name failslab, interval 1, probability 0, space 0, times 0 16:43:46 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = inotify_init1(0x800) inotify_rm_watch(r0, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r1 = inotify_init1(0x80800) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x20) [ 561.729699][ T3050] CPU: 0 PID: 3050 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 561.738528][ T3050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.748607][ T3050] Call Trace: [ 561.751909][ T3050] dump_stack+0x141/0x1d7 [ 561.756274][ T3050] should_fail.cold+0x5/0xa [ 561.761334][ T3050] ? __alloc_file+0x21/0x280 [ 561.765971][ T3050] should_failslab+0x5/0x10 [ 561.770499][ T3050] kmem_cache_alloc+0x5e/0x3a0 [ 561.775341][ T3050] __alloc_file+0x21/0x280 [ 561.779796][ T3050] alloc_empty_file+0x6d/0x170 [ 561.784706][ T3050] path_openat+0xe3/0x27e0 [ 561.789165][ T3050] ? __lock_acquire+0x16a7/0x5230 [ 561.794246][ T3050] ? path_lookupat+0x850/0x850 [ 561.799047][ T3050] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 561.805073][ T3050] do_filp_open+0x190/0x3d0 [ 561.809614][ T3050] ? may_open_dev+0xf0/0xf0 [ 561.814153][ T3050] ? alloc_fd+0x2e6/0x660 [ 561.818512][ T3050] ? lock_downgrade+0x6e0/0x6e0 [ 561.823408][ T3050] ? do_raw_spin_lock+0x120/0x2b0 [ 561.828462][ T3050] ? rwlock_bug.part.0+0x90/0x90 [ 561.833429][ T3050] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 561.839802][ T3050] ? _find_next_bit+0x1e3/0x260 [ 561.844689][ T3050] ? _raw_spin_unlock+0x24/0x40 [ 561.849562][ T3050] ? alloc_fd+0x2e6/0x660 [ 561.853922][ T3050] do_sys_openat2+0x16d/0x420 [ 561.858634][ T3050] ? build_open_flags+0x6f0/0x6f0 [ 561.863688][ T3050] ? __context_tracking_exit+0xb8/0xe0 [ 561.869194][ T3050] ? lock_downgrade+0x6e0/0x6e0 [ 561.874219][ T3050] __x64_sys_openat+0x13f/0x1f0 [ 561.879096][ T3050] ? __ia32_sys_open+0x1c0/0x1c0 [ 561.884090][ T3050] ? syscall_enter_from_user_mode+0x27/0x70 [ 561.890109][ T3050] do_syscall_64+0x3a/0xb0 [ 561.894571][ T3050] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 561.900484][ T3050] RIP: 0033:0x4196c4 [ 561.904419][ T3050] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 16:43:46 executing program 2: getresuid(&(0x7f0000000080), &(0x7f0000000040), 0x0) r0 = syz_io_uring_setup(0x64f8, &(0x7f00000000c0)={0x0, 0x519d, 0x0, 0xfffffffe, 0x187}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000140)) getuid() socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000002200), 0x2000, 0x0) syz_io_uring_setup(0x6b3e, &(0x7f0000002240)={0x0, 0xefac, 0x4, 0x3, 0x175, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000022c0), &(0x7f0000002300)=0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000002400)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0xa6776980345edb01}, 0x10001) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) getpgrp(r4) 16:43:46 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x2000000) [ 561.924176][ T3050] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 561.932724][ T3050] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 561.940902][ T3050] RDX: 0000000000000000 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c [ 561.948901][ T3050] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 561.958711][ T3050] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 561.966718][ T3050] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 16:43:47 executing program 4 (fault-call:0 fault-nth:9): syz_open_procfs$namespace(0x0, 0x0) 16:43:47 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000000), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x6}, @in={0x2, 0x4e21, @private=0xa010100}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e20, 0x3d, @private2={0xfc, 0x2, '\x00', 0x1}, 0x9}, @in={0x2, 0x4e20, @rand_addr=0x64010102}], 0x78) 16:43:47 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:47 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 16:43:47 executing program 1: getresuid(0x0, 0x0, 0x0) syz_io_uring_setup(0x56a7, &(0x7f0000000000)={0x0, 0xb287, 0x0, 0x2, 0x34a}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = syz_open_dev$admmidi(&(0x7f0000000100), 0x4, 0x101) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0xf0d, &(0x7f0000000140)=[r1, 0xffffffffffffffff], 0x2, 0x0, 0x1}, 0x3) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() r6 = getgid() read$FUSE(0xffffffffffffffff, &(0x7f0000004380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000063c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r9 = getgid() r10 = geteuid() write$FUSE_DIRENTPLUS(r2, &(0x7f0000008480)={0x3d8, 0x0, r3, [{{0x2, 0x0, 0x7c8, 0x4, 0x3, 0x6, {0x3, 0x0, 0x1, 0x0, 0x80000001, 0x1, 0x6, 0x6, 0x3, 0x0, 0xc2b, 0xee01, 0xffffffffffffffff, 0x140, 0x5}}, {0x2, 0x2da, 0x5, 0x8000, '.-,!@'}}, {{0x0, 0x3, 0x4, 0x4c, 0x2, 0x3, {0x5, 0x4, 0x6, 0x3, 0x3, 0x5, 0xdf72, 0x3, 0x3ff, 0x1000, 0xa14, 0xee00, r4, 0x1, 0x5}}, {0x0, 0x80, 0x1, 0x7, '\x00'}}, {{0x3, 0x1, 0x10854106, 0x8, 0xdb74, 0x4, {0x5, 0x3, 0x2, 0x4, 0x6, 0x4, 0x40, 0x1, 0x8, 0x6000, 0x2ea873ba, r5, r6, 0xe0c, 0x5}}, {0x4, 0x4, 0x1, 0x3, '+'}}, {{0x6, 0x0, 0x5, 0xf8, 0x1ff, 0x2, {0x6, 0xff, 0x80000001, 0x9, 0x1000, 0x0, 0x3, 0x7, 0x7, 0xa000, 0x3, r7, 0xee01, 0x1, 0x1}}, {0x5, 0x3f, 0x1, 0x6e, '#'}}, {{0x2, 0x2, 0x0, 0x3e48, 0x0, 0x80, {0x1, 0xffffffffffffffff, 0x3f, 0x1ff, 0x34a84a91, 0x1, 0x619a, 0x6, 0x3ff, 0xc000, 0x0, r8, r9, 0x10001, 0xc176}}, {0x4, 0x40, 0x1, 0x1000, '\x00'}}, {{0x0, 0x0, 0x4, 0x9, 0x8, 0x4, {0x2, 0x7fff, 0x6, 0x3, 0x200, 0xffffffffffff4a83, 0x5000, 0xc000000, 0x492cd4aa, 0x2000, 0x0, r10, 0xee00, 0x446, 0x6}}, {0x2, 0xd31, 0xe, 0x10000, '/dev/admmidi#\x00'}}]}, 0x3d8) geteuid() 16:43:47 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:47 executing program 2: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x5) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x8000, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40008c4}, 0x24048000) 16:43:47 executing program 3: read$FUSE(0xffffffffffffffff, 0x0, 0x0) [ 562.268029][ T3080] FAULT_INJECTION: forcing a failure. [ 562.268029][ T3080] name failslab, interval 1, probability 0, space 0, times 0 16:43:47 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:47 executing program 1: getresuid(0x0, 0x0, 0x0) syz_io_uring_setup(0x78e3, &(0x7f00000000c0)={0x0, 0x9063, 0x2, 0x2, 0xf9}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nfc={0x27, 0x1, 0x1, 0x4}}, 0x6) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) syz_io_uring_setup(0x7a38, &(0x7f0000000280)={0x0, 0xe9b2, 0x8, 0x0, 0x21b, 0x0, r1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000340)) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 16:43:47 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x2000000) [ 562.383953][ T3080] CPU: 0 PID: 3080 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 562.392723][ T3080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.402822][ T3080] Call Trace: [ 562.406135][ T3080] dump_stack+0x141/0x1d7 [ 562.410506][ T3080] should_fail.cold+0x5/0xa [ 562.415050][ T3080] ? security_file_alloc+0x34/0x170 [ 562.420286][ T3080] should_failslab+0x5/0x10 [ 562.424820][ T3080] kmem_cache_alloc+0x5e/0x3a0 [ 562.429890][ T3080] security_file_alloc+0x34/0x170 [ 562.434950][ T3080] __alloc_file+0xd8/0x280 [ 562.439402][ T3080] alloc_empty_file+0x6d/0x170 [ 562.444306][ T3080] path_openat+0xe3/0x27e0 [ 562.448773][ T3080] ? __lock_acquire+0x16a7/0x5230 [ 562.453844][ T3080] ? path_lookupat+0x850/0x850 [ 562.458653][ T3080] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 562.464686][ T3080] do_filp_open+0x190/0x3d0 [ 562.469406][ T3080] ? may_open_dev+0xf0/0xf0 [ 562.473957][ T3080] ? alloc_fd+0x2e6/0x660 [ 562.478340][ T3080] ? lock_downgrade+0x6e0/0x6e0 [ 562.483233][ T3080] ? do_raw_spin_lock+0x120/0x2b0 [ 562.488294][ T3080] ? rwlock_bug.part.0+0x90/0x90 [ 562.493273][ T3080] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 562.499560][ T3080] ? _find_next_bit+0x1e3/0x260 [ 562.504448][ T3080] ? _raw_spin_unlock+0x24/0x40 [ 562.509336][ T3080] ? alloc_fd+0x2e6/0x660 [ 562.513716][ T3080] do_sys_openat2+0x16d/0x420 [ 562.518439][ T3080] ? build_open_flags+0x6f0/0x6f0 [ 562.523502][ T3080] ? __context_tracking_exit+0xb8/0xe0 [ 562.529000][ T3080] ? lock_downgrade+0x6e0/0x6e0 [ 562.533901][ T3080] __x64_sys_openat+0x13f/0x1f0 [ 562.538793][ T3080] ? __ia32_sys_open+0x1c0/0x1c0 [ 562.543806][ T3080] ? syscall_enter_from_user_mode+0x27/0x70 [ 562.549748][ T3080] do_syscall_64+0x3a/0xb0 [ 562.554211][ T3080] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 562.560139][ T3080] RIP: 0033:0x4196c4 [ 562.564069][ T3080] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 562.583821][ T3080] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 562.592273][ T3080] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 562.600275][ T3080] RDX: 0000000000000000 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c [ 562.608280][ T3080] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 562.616284][ T3080] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 562.624308][ T3080] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 16:43:47 executing program 3: read$FUSE(0xffffffffffffffff, 0x0, 0x0) [ 562.648347][ T3249] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.654752][ T3249] ieee802154 phy1 wpan1: encryption failed: -22 16:43:47 executing program 4 (fault-call:0 fault-nth:10): syz_open_procfs$namespace(0x0, 0x0) 16:43:47 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000)=0x2, 0x4) 16:43:47 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) 16:43:47 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:47 executing program 3: read$FUSE(0xffffffffffffffff, 0x0, 0x0) 16:43:47 executing program 1: ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) getresuid(0x0, 0x0, 0x0) 16:43:48 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x20000, 0x80, 0x1}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000100)) accept(0xffffffffffffffff, &(0x7f0000000140)=@x25, &(0x7f00000001c0)=0x80) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:48 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) [ 563.115504][ T3116] FAULT_INJECTION: forcing a failure. [ 563.115504][ T3116] name failslab, interval 1, probability 0, space 0, times 0 16:43:48 executing program 1: ioctl$SNDRV_PCM_IOCTL_STATUS64(0xffffffffffffffff, 0x80984120, 0x0) getresuid(0x0, 0x0, 0x0) 16:43:48 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:48 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 563.213793][ T3116] CPU: 1 PID: 3116 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 563.222542][ T3116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.232800][ T3116] Call Trace: [ 563.236105][ T3116] dump_stack+0x141/0x1d7 [ 563.240520][ T3116] should_fail.cold+0x5/0xa [ 563.245073][ T3116] ? proc_self_get_link+0x187/0x1f0 [ 563.250478][ T3116] should_failslab+0x5/0x10 [ 563.255010][ T3116] kmem_cache_alloc_trace+0x55/0x2c0 [ 563.260469][ T3116] proc_self_get_link+0x187/0x1f0 [ 563.265531][ T3116] ? proc_ns_dir_lookup+0x2b0/0x2b0 [ 563.270768][ T3116] step_into+0x1483/0x1c80 [ 563.275229][ T3116] ? lookup_open.isra.0+0x13d0/0x13d0 [ 563.280648][ T3116] ? try_to_unlazy_next+0x470/0x470 [ 563.285995][ T3116] ? projid_m_show+0x220/0x220 [ 563.290791][ T3116] ? walk_component+0x109/0x6a0 [ 563.295683][ T3116] walk_component+0x171/0x6a0 [ 563.300432][ T3116] ? handle_dots.part.0+0x15d0/0x15d0 [ 563.305842][ T3116] ? make_kuid+0x1e/0x30 [ 563.310146][ T3116] ? generic_permission+0x126/0x5b0 [ 563.315464][ T3116] ? security_inode_permission+0xc5/0xf0 [ 563.321114][ T3116] link_path_walk.part.0+0x712/0xc90 [ 563.326423][ T3116] ? walk_component+0x6a0/0x6a0 [ 563.331293][ T3116] ? percpu_counter_add_batch+0xbd/0x180 [ 563.336941][ T3116] path_openat+0x25a/0x27e0 [ 563.341469][ T3116] ? path_lookupat+0x850/0x850 [ 563.346276][ T3116] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 563.352270][ T3116] do_filp_open+0x190/0x3d0 [ 563.356865][ T3116] ? may_open_dev+0xf0/0xf0 [ 563.361375][ T3116] ? rwlock_bug.part.0+0x90/0x90 [ 563.366396][ T3116] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 563.372641][ T3116] ? _find_next_bit+0x1e3/0x260 [ 563.377507][ T3116] ? _raw_spin_unlock+0x24/0x40 [ 563.382354][ T3116] ? alloc_fd+0x2e6/0x660 [ 563.386703][ T3116] do_sys_openat2+0x16d/0x420 [ 563.391397][ T3116] ? build_open_flags+0x6f0/0x6f0 [ 563.396661][ T3116] ? __context_tracking_exit+0xb8/0xe0 [ 563.402155][ T3116] ? lock_downgrade+0x6e0/0x6e0 [ 563.407215][ T3116] __x64_sys_openat+0x13f/0x1f0 [ 563.412085][ T3116] ? __ia32_sys_open+0x1c0/0x1c0 [ 563.417028][ T3116] ? syscall_enter_from_user_mode+0x27/0x70 [ 563.422929][ T3116] do_syscall_64+0x3a/0xb0 [ 563.427351][ T3116] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 563.433241][ T3116] RIP: 0033:0x4196c4 [ 563.437145][ T3116] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 563.457035][ T3116] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 563.465538][ T3116] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 [ 563.473518][ T3116] RDX: 0000000000000000 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c [ 563.481660][ T3116] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 563.489668][ T3116] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 563.497678][ T3116] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 16:43:48 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x100000, 0x8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r2 = accept(0xffffffffffffffff, &(0x7f0000000a00)=@nl=@unspec, &(0x7f0000000a80)=0x80) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) r3 = accept(r0, &(0x7f0000000080)=@l2tp={0x2, 0x0, @broadcast}, &(0x7f0000000100)=0x80) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), r3) getresuid(0x0, 0x0, 0x0) 16:43:48 executing program 4 (fault-call:0 fault-nth:11): syz_open_procfs$namespace(0x0, 0x0) 16:43:48 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) 16:43:48 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) syz_usb_disconnect(0xffffffffffffffff) 16:43:48 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:48 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 16:43:48 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), 0x4) getresuid(0x0, 0x0, 0x0) 16:43:48 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 16:43:48 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020}, 0x2020) 16:43:48 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006440)={0x278, 0xfffffffffffffff5, 0x0, [{{0x0, 0x0, 0x930c, 0x7f, 0x84d1, 0x4, {0x2, 0x70, 0x80000001, 0x3ff, 0x7fffffff, 0x2, 0x4, 0x5, 0x20, 0x8000, 0x10000, r0, 0xffffffffffffffff, 0x0, 0x5}}, {0x5, 0x4, 0x0, 0x80000000}}, {{0x3, 0x0, 0x7fffffff, 0x3601, 0x7, 0x50000, {0x0, 0x4, 0x81, 0xb0, 0x0, 0x5, 0x5, 0x7, 0x0, 0xc000, 0x7fff, r0, r2, 0x5, 0x1}}, {0x3, 0x0, 0x0, 0x3f0000}}, {{0x4, 0x3, 0x1, 0x2, 0x69, 0x7, {0x4, 0x100, 0x3f, 0xe0, 0x9, 0x61, 0x9, 0x7ff, 0xcff, 0x8000, 0x8, r3, r4, 0x7fff, 0xf3e8}}, {0x4, 0x6, 0x3, 0x10001, '.\x01:'}}, {{0x6, 0x0, 0x6, 0x8, 0x8, 0x400, {0x0, 0xffffffffffffffff, 0x5, 0x7ff, 0x10001, 0x14, 0x3, 0x4, 0x5, 0x6000, 0x6, r0, 0xee00, 0x5, 0x7}}, {0x2, 0x5, 0x0, 0x2}}]}, 0x278) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000000) [ 563.938043][ T3148] FAULT_INJECTION: forcing a failure. [ 563.938043][ T3148] name failslab, interval 1, probability 0, space 0, times 0 [ 563.993284][ T3148] CPU: 0 PID: 3148 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 564.002034][ T3148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.012116][ T3148] Call Trace: [ 564.015419][ T3148] dump_stack+0x141/0x1d7 [ 564.019785][ T3148] should_fail.cold+0x5/0xa [ 564.024323][ T3148] ? __d_alloc+0x2a/0x950 [ 564.028818][ T3148] should_failslab+0x5/0x10 [ 564.033361][ T3148] kmem_cache_alloc+0x5e/0x3a0 [ 564.038165][ T3148] __d_alloc+0x2a/0x950 [ 564.042354][ T3148] d_alloc+0x4a/0x230 [ 564.046364][ T3148] d_alloc_parallel+0xe9/0x1a00 [ 564.051337][ T3148] ? __d_lookup+0x3fd/0x710 [ 564.055876][ T3148] ? lock_downgrade+0x6e0/0x6e0 [ 564.060860][ T3148] ? find_held_lock+0x2d/0x110 [ 564.065663][ T3148] ? __d_lookup_rcu+0x6c0/0x6c0 [ 564.070571][ T3148] ? __d_lookup+0x41f/0x710 [ 564.075115][ T3148] ? d_lookup+0x14f/0x170 [ 564.079488][ T3148] lookup_open.isra.0+0x863/0x13d0 [ 564.084650][ T3148] ? lookup_fast+0x6d0/0x6d0 [ 564.089459][ T3148] ? flexcop_usb_probe.cold+0x2a3/0x8ff [ 564.095054][ T3148] ? flexcop_usb_probe.cold+0x2a3/0x8ff [ 564.100654][ T3148] path_openat+0x9b4/0x27e0 [ 564.105209][ T3148] ? path_lookupat+0x850/0x850 [ 564.110014][ T3148] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 564.116048][ T3148] do_filp_open+0x190/0x3d0 [ 564.120599][ T3148] ? may_open_dev+0xf0/0xf0 [ 564.125162][ T3148] ? simple_attr_release+0x40/0x40 [ 564.130331][ T3148] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 564.136871][ T3148] ? _find_next_bit+0x1e3/0x260 [ 564.141770][ T3148] ? _raw_spin_unlock+0x24/0x40 [ 564.146650][ T3148] ? alloc_fd+0x2e6/0x660 [ 564.151021][ T3148] do_sys_openat2+0x16d/0x420 [ 564.155740][ T3148] ? build_open_flags+0x6f0/0x6f0 [ 564.160809][ T3148] ? __context_tracking_exit+0xb8/0xe0 [ 564.166400][ T3148] ? lock_downgrade+0x6e0/0x6e0 [ 564.171469][ T3148] __x64_sys_openat+0x13f/0x1f0 [ 564.176478][ T3148] ? __ia32_sys_open+0x1c0/0x1c0 [ 564.181457][ T3148] ? syscall_enter_from_user_mode+0x27/0x70 [ 564.187502][ T3148] do_syscall_64+0x3a/0xb0 [ 564.191956][ T3148] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 564.197887][ T3148] RIP: 0033:0x4196c4 [ 564.201823][ T3148] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 564.221753][ T3148] RSP: 002b:00007fc1ccdc3060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 564.230200][ T3148] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004196c4 16:43:49 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)={0x194, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x40000}, 0x8000040) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0xa0400, 0x0) r3 = openat$incfs(r2, &(0x7f0000000100)='.log\x00', 0x121000, 0x130) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) symlinkat(&(0x7f0000000180)='./file0\x00', r4, &(0x7f00000001c0)='./file0\x00') write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x1, 0x100000001, 0x40}}, 0x28) ioctl$SNDRV_PCM_IOCTL_STATUS64(r2, 0x80984120, &(0x7f0000000040)) getresuid(0x0, 0x0, 0x0) geteuid() 16:43:49 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) [ 564.238217][ T3148] RDX: 0000000000000000 RSI: 00007fc1ccdc30f0 RDI: 00000000ffffff9c [ 564.246392][ T3148] RBP: 00007fc1ccdc30f0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 564.254396][ T3148] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 564.262403][ T3148] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 16:43:49 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020}, 0x2020) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:49 executing program 4 (fault-call:0 fault-nth:12): syz_open_procfs$namespace(0x0, 0x0) 16:43:49 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020}, 0x2020) [ 564.520858][ T3171] FAULT_INJECTION: forcing a failure. [ 564.520858][ T3171] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 564.565944][ T3171] CPU: 0 PID: 3171 Comm: syz-executor.4 Not tainted 5.13.0-rc4-syzkaller #0 [ 564.574699][ T3171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.584783][ T3171] Call Trace: [ 564.588090][ T3171] dump_stack+0x141/0x1d7 [ 564.592474][ T3171] should_fail.cold+0x5/0xa [ 564.597019][ T3171] _copy_to_user+0x2c/0x150 [ 564.601566][ T3171] simple_read_from_buffer+0xcc/0x160 [ 564.606991][ T3171] proc_fail_nth_read+0x187/0x220 [ 564.612060][ T3171] ? proc_exe_link+0x1d0/0x1d0 [ 564.616863][ T3171] ? security_file_permission+0x248/0x560 [ 564.622629][ T3171] ? proc_exe_link+0x1d0/0x1d0 [ 564.627432][ T3171] vfs_read+0x1b5/0x570 [ 564.631631][ T3171] ksys_read+0x12d/0x250 [ 564.635910][ T3171] ? vfs_write+0xa30/0xa30 [ 564.640397][ T3171] ? syscall_enter_from_user_mode+0x27/0x70 [ 564.646340][ T3171] do_syscall_64+0x3a/0xb0 [ 564.650792][ T3171] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 564.656717][ T3171] RIP: 0033:0x41935c [ 564.660645][ T3171] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 564.680285][ T3171] RSP: 002b:00007fc1ccdc3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 564.688738][ T3171] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 564.696742][ T3171] RDX: 000000000000000f RSI: 00007fc1ccdc31e0 RDI: 0000000000000003 [ 564.704949][ T3171] RBP: 00007fc1ccdc31d0 R08: 0000000000000000 R09: 00007fc1ccdc2f70 [ 564.713039][ T3171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 564.721039][ T3171] R13: 0000000000a9fb1f R14: 00007fc1ccdc3300 R15: 0000000000022000 16:43:49 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020}, 0x2020) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:49 executing program 1: setsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000000)=0x4, 0x4) getuid() 16:43:49 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020}, 0x2020) 16:43:49 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 16:43:49 executing program 4: syz_open_procfs$namespace(0x0, 0x0) 16:43:49 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x600081, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001a80)=0x14, 0x80000) accept4$packet(r0, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002380)=0x14, 0x0) sendmsg$can_j1939(r0, &(0x7f00000036c0)={&(0x7f00000024c0)={0x1d, r3, 0x2, {0x0, 0xf0, 0x4}, 0x2}, 0x18, &(0x7f0000002600)={&(0x7f0000002500)="b14f0c89d982b2ca7929a58d9f189d20be2707d21249de66eec44f57b2f413a1c759cb5ab0672d35acbe28214d5f1eb615f7cb1e80a29b3bca91fb19254d5c18a29860ea14db3a7310095ebf1a716f0cbcc2075aa52d32a288b93b6776fc9190e14502597abdaf340c9dc796dffad99dfc1f0d5dfe7d80ac8430f31414a5f514709cf725b4a79ea73adaf45d47689ba601a59d2c0353f40d80ceca13767d0532fc1e9eac920d72a1d9430dc731cd22dfcacb356c7c3174aaf5050e9f326615f997db178e5ac7f03022277c8179fbfd4fdb", 0xd1}, 0x1, 0x0, 0x0, 0x20004081}, 0x8000) accept4$packet(r0, &(0x7f00000023c0)={0x11, 0x0, 0x0}, &(0x7f0000002400)=0x14, 0x800) accept4$packet(r0, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000002480)=0x14, 0x80000) accept4$packet(r0, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002680)=0x14, 0x0) accept4$packet(r0, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004000)=0x14, 0x1800) accept$packet(0xffffffffffffffff, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004100)=0x14) recvmsg$kcm(r0, &(0x7f00000047c0)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000046c0)=[{&(0x7f00000041c0)}, {&(0x7f0000004200)=""/66, 0x42}, {&(0x7f0000004280)=""/212, 0xd4}, {&(0x7f0000004380)=""/237, 0xed}, {&(0x7f0000004480)=""/157, 0x9d}, {&(0x7f0000004540)=""/87, 0x57}, {&(0x7f00000045c0)=""/158, 0x9e}, {&(0x7f0000004680)=""/10, 0xa}], 0x8, &(0x7f0000004740)=""/90, 0x5a}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000004ac0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000004a80)={&(0x7f0000004800)={0x258, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4f8ed089aa600858}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000080) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:49 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020}, 0x2020) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:50 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x1}, 0x2}, 0x18) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x8000000) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@ax25={{0x3, @rose}, [@netrom, @default, @rose, @remote, @remote, @null, @netrom, @bcast]}, 0x0, 0x800, 0x1}, 0x1) r3 = socket(0x28, 0x80000, 0xd960) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r4, 0x3) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x8, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x44000) 16:43:50 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 16:43:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 16:43:50 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x8) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) 16:43:50 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:50 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r3, 0x0) add_key(&(0x7f0000002040)='dns_resolver\x00', &(0x7f0000002080)={'syz', 0x0}, &(0x7f00000020c0)="0a92fd4d25ea18bf8a3bb02f3ebc993b6d19ec9cbb636731744a35f84cdfeea40142c6b708", 0x25, 0xfffffffffffffffc) r4 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r4) r5 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r5) keyctl$search(0xa, r4, &(0x7f0000002140)='dns_resolver\x00', &(0x7f0000002180)={'syz', 0x3}, r5) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) r7 = geteuid() write$FUSE_DIRENTPLUS(r6, &(0x7f0000002540)=ANY=[@ANYBLOB="d803000000000000", @ANYRES64=r0, @ANYBLOB="02000000000000000200000000000000229a0000000000000000ffffffffffff060000007f00000003000000000000000300000000000000070000000000000002000000000000006c00000000000000050000000000000006000000010400006400000000800000de000000", @ANYRES32=0xee01, @ANYRES32=r2, @ANYBLOB="010000000400000000000000000000000000000000040000000000000200000006000000283a000000000000050000000000000002000000000000000000000001000000030000000000000007000000ff7f0000020000000000000000000000000000000500000000000000ff0000000000000000100000000000000500000000000000d90200004b010000090000000060000008000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="e1ffffffff0700000000000005000000000000000300000000000000030000000200000073797a0000000000010000000000000003000000000000000100000000000000070000000000000006000000010000000000000000000000010000000000000081000000000000000800000000000000010000000100000006000000000000002000000005000000030000000040000002000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="02000000ff01000000000000000000000000000000000080000000000500000003000000212c262d2500000004000000000000000300000000000000010000800000000009000000000000000700000001040000010000000000000096f5ffffffffffff020000000000000004000000000000000100010100000000f86400000000000000000000050000000800000000600000010000802b", @ANYRES32=r7, @ANYRES32=r2, @ANYBLOB="ff7f00000900000000000000060000000000000006000000000000000d0000003f000000646e735f7265736f6c76657200000000040000000000000002000000000000002ea9ffffffffffff0900000000000000f2fb000005000000040000000000000000000100000000002900000000000000030000000000000000000000c0000000ff070000000000000001000004000000680a000000c0000006000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="01000000200000000000000003000000000000008da600000000000006000000020000007b7d257d2d5e000000000000000000000200000000000000040000000000000040000000000000000100000001040000010000000000000003000000000000000600000000000000ff000000000000000700000000000000050000000000000001000000ff0100000900000000600000a22f0000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="0300000003000000000000000200000000000000018000000000000003000000ff0f00007d3a2b0000000000"], 0x3d8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000021c0), 0x80c80, 0x0) 16:43:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:50 executing program 1: ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000040)) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xc623) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 16:43:50 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x1}, 0x2}, 0x18) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x8000000) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@ax25={{0x3, @rose}, [@netrom, @default, @rose, @remote, @remote, @null, @netrom, @bcast]}, 0x0, 0x800, 0x1}, 0x1) r3 = socket(0x28, 0x80000, 0xd960) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r4, 0x3) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x8, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x44000) 16:43:50 executing program 2: accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x80) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, 0x0, 0x0, {0x2, 0x1}, 0xfe}, 0x18) getresuid(&(0x7f0000000040), &(0x7f0000000000), 0x0) 16:43:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x1c00) 16:43:50 executing program 4: r0 = syz_open_procfs$namespace(0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)={0x80000005}) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@GTPA_I_TEI={0x8, 0x8, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40004) 16:43:50 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:50 executing program 1: syz_io_uring_setup(0x7b83, &(0x7f0000000000)={0x0, 0x86e5, 0x2, 0x1, 0xd1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x401, &(0x7f0000000100)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2, 0x0, 0x1}, 0x9) getresuid(0x0, 0x0, 0x0) 16:43:50 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x1}, 0x2}, 0x18) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x8000000) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@ax25={{0x3, @rose}, [@netrom, @default, @rose, @remote, @remote, @null, @netrom, @bcast]}, 0x0, 0x800, 0x1}, 0x1) r3 = socket(0x28, 0x80000, 0xd960) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r4, 0x3) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x8, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x44000) 16:43:50 executing program 2: ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000000c0)={@desc={0x1, 0x0, @desc1}}) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) getuid() 16:43:50 executing program 0: pipe2$9p(0x0, 0x1c00) 16:43:50 executing program 4: getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x3, 0x0) 16:43:50 executing program 5: pipe2$9p(&(0x7f0000000000), 0x1c00) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$pptp(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x2, {0x3, @multicast1}}, 0x1e) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa0010040}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_SOPASS={0x1e, 0x3, "d1dc2cdd5729f6b5dced75d5fd15b3689769e1adc565ea87439c"}]}, 0x34}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) getresuid(0x0, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/186, 0xba}, {&(0x7f0000000140)=""/38, 0x26}], 0x2}, 0x23) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000240)=0x2) 16:43:50 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x1}, 0x2}, 0x18) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x8000000) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@ax25={{0x3, @rose}, [@netrom, @default, @rose, @remote, @remote, @null, @netrom, @bcast]}, 0x0, 0x800, 0x1}, 0x1) r3 = socket(0x28, 0x80000, 0xd960) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r4, 0x3) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x8, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x44000) 16:43:50 executing program 0: pipe2$9p(0x0, 0x0) 16:43:50 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x440802, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x9, 0x82000) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f00000001c0)={'exec ', '/dev/snd/pcmC#D#p\x00'}, 0x17) ioctl$SNDRV_PCM_IOCTL_INFO(r1, 0x81204101, &(0x7f0000000080)) syz_open_procfs$namespace(0x0, 0x0) 16:43:50 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000000), 0x0) 16:43:50 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:50 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b00)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000001d80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12004620}, 0xc, &(0x7f0000001d40)={&(0x7f0000001b40)=ANY=[@ANYBLOB="c4010000", @ANYRES16=r1, @ANYBLOB="000425bd7000fedbdf250c0000006800018008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c6572310000000000001400020069705f76746930c7000000000000000008000100", @ANYRES32=r2, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020067656e65766531000000000000000000140002006361696630000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000001400020076657468305f766972745f776966690008000300000000000800030003000000"], 0x1c4}, 0x1, 0x0, 0x0, 0x20004040}, 0x8880) geteuid() sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f00000001c0)={0x2f0, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x5c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x363}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3a8e}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x802000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}]}, @TIPC_NLA_NODE={0xdc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x43, 0x4, {'gcm(aes)\x00', 0x1b, "a19da865d36f7c3ad59c60821666d31d54cb7a109fadd08ae85c4f"}}, @TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "6285e3dc31ffa122d635eb60fcdcbb4dfaac76cd2f317b18f10b9165bbb957b9eae0cc9a"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "68cf8e5992b35065d1b8a92b3cafbec2b5650dae60600f977f2e"}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3f}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x541}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x42b1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xd8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdc5d24e}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8, @local, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7fffffff, @mcast1, 0x7}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xfa6, @empty, 0x9}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x4c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2f0}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000080)="407cc13ec9612be51edc0b56ad2d445f6b39cb9b5cc0fbd3c5621c1f33047871518163ae93e480074f51e464b5ca4db604059f68fc2d02bcb56bb9ac939e30dc4e6b76b5f03d7a17474e3c6301a08545b328c95e3b290339477d0d2ffacf83fba5decf337ce55d64f6fdacc1625af7cb50ef7ecb4e670774f3c32c04be0c3f2e68cfd585ead220b614eb1e5807a4f3b44f4d6021c1c0cfc9e5e290fc663b5d745bfb2c031fcee39a21aa95a875773eb1abebaf770e3cad6f53d1c206c307e056ef1c3108cbba17903e237d5b38e43dd8f65a77b8dad416745325516f1e62d1ed65161b996e68d03eef466e1481", 0xed) 16:43:50 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x1}, 0x2}, 0x18) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x8000000) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@ax25={{0x3, @rose}, [@netrom, @default, @rose, @remote, @remote, @null, @netrom, @bcast]}, 0x0, 0x800, 0x1}, 0x1) socket(0x28, 0x80000, 0xd960) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) 16:43:50 executing program 0: pipe2$9p(0x0, 0x0) 16:43:51 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:51 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:51 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000040)={0x0, 0x1, r0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000000)={r1, 0x1, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD(0xffffffffffffffff, 0xc01064c1, &(0x7f0000000180)={r2, 0x0, r3}) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD(0xffffffffffffffff, 0xc01064c1, &(0x7f0000000200)={r4, 0x1, r5}) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x18}}, @GTPA_VERSION={0x8, 0x2, 0x6}, @GTPA_I_TEI={0x8}, @GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x0) 16:43:51 executing program 1: getresuid(0x0, 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) 16:43:51 executing program 0: pipe2$9p(0x0, 0x0) 16:43:51 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x1}, 0x2}, 0x18) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x8000000) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@ax25={{0x3, @rose}, [@netrom, @default, @rose, @remote, @remote, @null, @netrom, @bcast]}, 0x0, 0x800, 0x1}, 0x1) socket(0x28, 0x80000, 0xd960) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) 16:43:51 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:51 executing program 2: ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000000)) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:51 executing program 0: pipe2$9p(0x0, 0x0) 16:43:51 executing program 4: accept4$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000600)=0x14, 0x80000) accept$packet(0xffffffffffffffff, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001180)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001380)={&(0x7f00000011c0)={0x1b0, 0x0, 0x1c, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x4}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x10}, 0x4800) syz_open_procfs$namespace(0x0, 0x0) 16:43:51 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:51 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001740), 0x40000, 0x0) accept$packet(r0, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) connect$packet(r1, &(0x7f0000002bc0)={0x11, 0x11, r2, 0x1, 0x0, 0x6, @local}, 0x14) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) write$midi(r3, &(0x7f0000000040)="eb2529d469d0f730575ea367542437ba429454c9eaafd4e27a90ca3384d40aefa22d57948262185d626a2b3304a16c4b6d939f75c1b0b2e200f6d9707c5d8300cd8194f90e1f7382f3f78d0c9f11a43a56b4f942eca910e09bd5b2f6309cabbd81207933ad03b2419af8dfaff3bf72e276e834d82ac5032f2ff0e9ca493b3441a3ff3988e6e8b94937baaea77d", 0x8d) getsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), r0) socket$inet6_dccp(0xa, 0x6, 0x0) getresuid(0x0, 0x0, 0x0) 16:43:51 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x1}, 0x2}, 0x18) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x8000000) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@ax25={{0x3, @rose}, [@netrom, @default, @rose, @remote, @remote, @null, @netrom, @bcast]}, 0x0, 0x800, 0x1}, 0x1) socket(0x28, 0x80000, 0xd960) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:43:51 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) 16:43:51 executing program 0: pipe2$9p(0x0, 0x0) 16:43:51 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x8200, 0x0) inotify_rm_watch(r0, 0x0) syz_open_procfs$namespace(0x0, 0x0) 16:43:51 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:51 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x1}, 0x2}, 0x18) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x8000000) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@ax25={{0x3, @rose}, [@netrom, @default, @rose, @remote, @remote, @null, @netrom, @bcast]}, 0x0, 0x800, 0x1}, 0x1) socket(0x28, 0x80000, 0xd960) 16:43:51 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) getuid() getuid() ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0x2020) 16:43:51 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) geteuid() r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x9) 16:43:51 executing program 0: pipe2$9p(0x0, 0x0) 16:43:51 executing program 4: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f00000000c0)=""/10, &(0x7f0000000100)=0xa) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/ipc\x00') 16:43:51 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:51 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x1}, 0x2}, 0x18) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x8000000) socket(0x28, 0x80000, 0xd960) 16:43:51 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000080)=0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x20600, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYRES32=r0], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) getresuid(&(0x7f0000000140), &(0x7f0000000240), &(0x7f0000000280)) read$FUSE(r1, &(0x7f00000002c0)={0x2020}, 0xff80) write$FUSE_DIRENTPLUS(r1, &(0x7f00000027c0)={0x10}, 0x10) 16:43:51 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000040)={0x228, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x74, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd818}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfb9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xba}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x385d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x100}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}, @TIPC_NLA_NODE={0x8c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "980f84613b38ac63282f99b58c771787ad608c23ec"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "ad501785f21b9a5c03c0392479eefe0cc2e32a23254971"}}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2666}]}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb64b}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}]}]}]}, 0x228}}, 0x0) 16:43:51 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:52 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000000) 16:43:52 executing program 4: ioctl$SNDRV_PCM_IOCTL_STATUS64(0xffffffffffffffff, 0x80984120, &(0x7f0000000000)) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(0xffffffffffffffff, 0xc0984124, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0xa0800, 0x80) write$usbip_server(r0, &(0x7f00000001c0)=@ret_submit={{0x3, 0x8001, 0x0, 0x1, 0x8}, 0x2, 0x45, 0x5, 0x293, 0x1, 0x0, "9f086bd67aa8e7608f1e86ef9053c3bd5f755f49f8ff2c5e2f07f19fe2d19e8927d587a69b8173e7c5f762ece710739dd0379385dc327f32112dcbb227d14e6d936e3bd4e6", [{0x2, 0x7, 0x1b, 0x8dc}, {0x2695, 0x478528d4, 0x4, 0x654}, {0xbb, 0xfffff9e4, 0xfffffc00, 0xc2}, {0x9, 0x15d, 0x7, 0x2}, {0xfffffffc, 0x2, 0x5, 0x1ff}, {0x5, 0x200, 0x3, 0x20}, {0x5, 0x19, 0x7, 0x4a}, {0x5, 0x8, 0x7, 0x1ff}, {0xe8, 0x7fa, 0xffffffba, 0x7fff}, {0x80000001, 0x99, 0x3, 0x800}, {0xc2, 0x800, 0x9, 0xc5f9}, {0x3f, 0xea, 0x81, 0x2}, {0x9, 0xffffffff, 0x2, 0x1}, {0x1, 0x3, 0x3, 0x4}, {0x1, 0x7, 0x8, 0x8}, {0x7, 0xffffffff, 0xa07, 0x8}, {0x4, 0x1000, 0x0, 0x200}, {0x5, 0x1, 0xffff, 0x3}, {0x3, 0x80, 0x78, 0x1000}, {0x353a, 0x1, 0xb2bd, 0x7}, {0x3, 0x7, 0x7d3a, 0x9}, {0x0, 0x5, 0x49d20d78, 0x40000}, {0x3, 0x3f, 0x1f, 0x8}, {0x4, 0x7, 0x9, 0x20}, {0x0, 0x40, 0x3, 0x3f}, {0x4c, 0x0, 0xff, 0x100}, {0x8, 0x3, 0x6, 0x101}, {0x0, 0x0, 0x9, 0x5}, {0x20, 0x1d13, 0x3f, 0x7fff}, {0x5, 0x928d, 0x473dc593, 0xffffffeb}, {0x7f, 0x6, 0x1, 0x7}, {0x81, 0x4e, 0xb97, 0x1}, {0x3, 0x10000, 0x7, 0x2}, {0xffffffc0, 0x1, 0x6f78d4bf, 0xfff}, {0x2, 0xff, 0x20, 0x7}, {0x8, 0x400, 0x7, 0x800}, {0xffff, 0xffff, 0x5}, {0x8, 0x2, 0x5, 0x1000}, {0x6, 0x9, 0x2, 0x8}, {0x1, 0x5, 0xff, 0x8}, {0x0, 0x1, 0xb7}, {0x2, 0x5, 0x200, 0x3}, {0xffff, 0x82, 0x9d1, 0x8001}, {0xff, 0xffff0001, 0x36, 0x8000}, {0x5, 0x3ff, 0x7, 0x80000001}, {0x20, 0x6, 0x0, 0x4}, {0x4, 0x80000000, 0x0, 0x7}, {0x8000, 0x3, 0x80, 0xaa}, {0x88, 0x1, 0x60, 0x3}, {0x1, 0x5, 0x7ff, 0x6}, {0x8000, 0x1, 0x7, 0x8000}, {0x80000000, 0xffe00, 0x5, 0x1000}, {0x3, 0x4, 0x14, 0x72}, {0x0, 0x0, 0x6, 0xffff}, {0x9, 0x7, 0x6, 0x2}, {0x3d, 0x6, 0x960, 0x8001}, {0x6, 0x3, 0x1, 0xe6}, {0x1ff, 0x101, 0xffffffc0, 0x8}, {0x7f, 0x2, 0x6, 0x40800}, {0x5fb0c792, 0x80000001, 0x70000}, {0x80000000, 0x3, 0x7, 0x5}, {0x9, 0xc4, 0x2, 0x4}, {0x3f, 0x400, 0x4, 0x320}, {0x4, 0xffffff77, 0x782626e5, 0x7}, {0x5, 0x7fffffff, 0x10000000, 0x5}, {0x7ff, 0x800, 0xe68}, {0x4, 0x8, 0x6, 0x1ff}, {0x80, 0x8000, 0x3, 0x200}, {0xd793, 0x20, 0x4, 0xfffffff7}, {0x3, 0x8, 0x8, 0xfffffffc}, {0x6, 0x1, 0x9, 0x2}, {0xfffffff5, 0x100, 0xffffffc0, 0x7fe}, {0x1, 0x7, 0xfbed}, {0x4, 0x5, 0x0, 0x45c}, {0xffffffff, 0xc2, 0x5, 0xe099}, {0x7, 0x5, 0xfffffffd}, {0x0, 0xff, 0xffffff7f, 0xdcc00000}, {0x40, 0x794b, 0x92e, 0x5}, {0x1, 0x200, 0xfffffff9, 0xa685}, {0x0, 0x1, 0x6, 0x81}, {0x400, 0x5, 0x9, 0x64}, {0x2, 0x7fffffff, 0x8, 0xfff}, {0x0, 0x81, 0x336, 0x1ec8ab5}, {0x1, 0x6, 0x7fff, 0x4}, {0x3f, 0xa0000, 0x8000, 0x1ae}, {0xfffffffe, 0x80000001, 0x7, 0xfba}, {0x4, 0xff, 0x800000, 0xac73}, {0x4, 0x0, 0x3}, {0x6, 0x4, 0x1ff}, {0x4a08, 0x25b, 0x5, 0x1}, {0x5, 0xfad, 0x8, 0x9}, {0x2, 0x9, 0x1, 0x7fff}, {0x0, 0x5, 0x9, 0x8}, {0x1921, 0x5, 0x3, 0xffffffff}, {0x1, 0x1, 0x3, 0xfffff001}, {0x3, 0xff, 0xa68, 0x6}, {0x4ffe, 0x20, 0x101, 0x3fe0000}, {0x5, 0x3, 0x80000000, 0x2}, {0xfffffffc, 0x9, 0x3, 0x5}, {0x8001, 0x0, 0x982, 0x8}, {0x2, 0x53, 0x1, 0x7}, {0x9, 0xfffffff8, 0xff, 0x5}, {0x6, 0xa6a4, 0x3, 0x8}, {0x81, 0x7ff, 0x1, 0x4}, {0x10000, 0x1, 0x2, 0x4}, {0x1, 0x6, 0x5, 0xffffff7c}, {0x8, 0x1, 0x13, 0x1}, {0x1ec, 0x400, 0x7, 0x8001}, {0x8a5, 0x80, 0x4, 0x5}, {0x1, 0x400, 0x1f, 0xa0}, {0x5, 0x2, 0x8ae1, 0x3f}, {0xff, 0x1f, 0x8001, 0x101}, {0x1, 0xffff, 0x2, 0x4}, {0x9, 0x1, 0x4, 0x5}, {0xcef, 0x3, 0x0, 0x1}, {0x9, 0x9, 0xfffffffc, 0x1}, {0x2, 0x0, 0x4, 0x2}, {0x1ff, 0x6, 0x1, 0x3}, {0x4, 0xec0, 0x3, 0x6}, {0x2, 0x24000000, 0x8, 0x77}, {0x6, 0x8, 0x20, 0x2}, {0x4, 0x2, 0x2, 0x1e1d}, {0xffffffff, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x4, 0x1}, {0x3ff, 0x7fffffff, 0x81, 0x1}, {0x80, 0x9}, {0x9, 0x100, 0x6, 0x3}, {0x4, 0x5, 0xffffff4e, 0x3ff}, {0xffffd05e, 0x8001, 0x4, 0x7}, {0x5, 0x7fff, 0x9, 0x9}, {0x7fff, 0x8be, 0x1, 0x296}, {0x9, 0x3dc, 0xffff, 0x800}, {0x4, 0x9, 0x1c8}, {0x7, 0x5, 0x4}, {0x68c, 0x7ff, 0x101, 0x3}, {0x533, 0x1ff, 0x0, 0x8000}, {0x3ff, 0x7fffffff, 0x8, 0x9}, {0x10000, 0x7f, 0x7ff, 0x40}, {0x4, 0x9, 0x80000001, 0x20}, {0x6000000, 0x1000, 0x80, 0xd96}, {0xffff, 0xf29, 0x9, 0x47}, {0x2, 0x9, 0xfffffffd, 0x1f}, {0x81, 0x3, 0x80000001, 0x1}, {0x2, 0x81, 0xfffff2f7, 0x40}, {0x8, 0x4, 0x1, 0x10000}, {0x4, 0xec5, 0x2, 0x800}, {0x4, 0x2, 0x1ff, 0x9}, {0xfffffeff, 0xffff7fff, 0xde0, 0xa2c}, {0x8000, 0x4f, 0x93, 0x1e3951df}, {0x4, 0x7ff, 0x5, 0x8}, {0x7, 0x7, 0x7cc2, 0x4}, {0x68e8, 0x8, 0x400, 0x2}, {0x7, 0xffffffe0, 0x5, 0x2}, {0x9, 0x9, 0x192e6d19, 0x3ff}, {0x8001, 0x7ff, 0x7, 0x8}, {0x7ff, 0x8, 0x4, 0x8001}, {0x1, 0x9c76, 0x9, 0x3239}, {0x7, 0x17, 0x0, 0x4}, {0xa9, 0x1, 0x5, 0x7}, {0x1, 0x800, 0x8, 0x81}, {0x7, 0x3, 0x0, 0x4}, {0x8, 0xecd, 0x80000001, 0x2}, {0x800, 0x401, 0x0, 0x7}, {0x20, 0x400, 0xa7f, 0x4}, {0x3, 0x1, 0xffffffff, 0x3}, {0x5, 0xcea, 0x1}, {0x9c, 0x1, 0x8001, 0x8}, {0x3ff, 0xfffffff9, 0x80000000, 0xffff0001}, {0x9d, 0x0, 0xe7, 0x6}, {0xffff, 0x2, 0x1, 0x1}, {0x17, 0xfff, 0x1ff, 0x1}, {0x3, 0x3, 0x6, 0x2}, {0x400, 0x3, 0x3f, 0x8000}, {0x7, 0x5, 0x0, 0x20}, {0x3, 0x4, 0x7, 0x2}, {0x3f, 0x1, 0x200, 0xfff}, {0x20, 0x0, 0x8, 0x5}, {0x92, 0xfffffffe, 0x7, 0x722}, {0x7, 0x2, 0x1, 0xffff34f6}, {0x80000000, 0x4, 0x9, 0x80000000}, {0xffff8000, 0x7ff, 0x7fffffff, 0x1}, {0xf3d, 0x4, 0x0, 0x3f}, {0x8, 0x1, 0x2f4, 0x1}, {0x80000001, 0x4, 0x8000, 0xec5}, {0x3, 0x10001, 0x3, 0x4}, {0x20, 0x4, 0x7, 0x800}, {0xfffffffb, 0x4, 0x8}, {0x2, 0x400, 0xfff}, {0x1, 0x8, 0xdf, 0x7fff}, {0x3ff, 0x6, 0x6, 0x1d}, {0x800, 0x9, 0x8000, 0x10000}, {0x9, 0x6, 0x4, 0x7}, {0x3, 0x1, 0x2, 0x80}, {0x8001, 0x200, 0x100, 0x200}, {0x4a59, 0x8, 0xfffffffb, 0x81}, {0x3, 0x6, 0xff, 0x5}, {0x3, 0x1, 0x6, 0x5}, {0x8, 0x6, 0x3ff80000, 0x5a2}, {0x1, 0x1000, 0x0, 0x2}, {0x885, 0x101, 0x3, 0x4}, {0x9, 0xd7c, 0x3, 0x5}, {0x5, 0x5a2, 0x0, 0x2}, {0xfffffffb, 0x2, 0x2e, 0x2}, {0x80000001, 0x247, 0x3, 0x7}, {0x8, 0x2, 0x8, 0x1}, {0x6, 0x1, 0x1000, 0x7}, {0x0, 0x7fffffff, 0x80008, 0x3}, {0x1, 0x1, 0xe7, 0x4}, {0x2, 0xffffffff, 0x10001, 0x3}, {0x1f, 0x6, 0x1, 0x693}, {0x3, 0xfffffffd, 0x8000}, {0x6, 0x9, 0x6, 0x80}, {0x7, 0x7f, 0x5, 0x5}, {0xdd, 0x7, 0x101, 0x7}, {0xffff, 0x101, 0x101, 0x6}, {0x80000001, 0x2, 0x4, 0x9}, {0x6, 0x4, 0x5f, 0x81}, {0x2, 0x6, 0x4, 0x7f}, {0x6, 0xb6, 0x10000, 0x6}, {0x7fff, 0x4, 0x9, 0x4}, {0x284, 0x7fff, 0x4, 0x2}, {0xb0, 0x330fe322, 0x200, 0x3ff}, {0x7, 0x83, 0x8, 0x6}, {0x4, 0x2, 0x7, 0x40}, {0xe7, 0x4, 0x4, 0x3}, {0x5, 0x6, 0x4}, {0x653, 0x750, 0x40, 0x4}, {0x7fffffff, 0x0, 0x3}, {0x3, 0x7015, 0x79, 0x7fff}, {0x9, 0x7, 0x1ff, 0xdec2}, {0x1ff, 0x1f, 0x3, 0x7fffffff}, {0x1, 0xc89, 0x3f, 0x7fff}, {0x0, 0x8, 0x1, 0x3}, {0x683df0f8, 0x2, 0x2, 0x4}, {0xb8, 0x2d, 0x5, 0x7}, {0x6e4, 0x7599, 0x6, 0x3}, {0x6b1, 0x7ff, 0x3, 0x7ff}, {0xffff, 0x2, 0x80, 0xff}, {0xfffffff7, 0x5, 0x8, 0x81}, {0x7ff, 0x6, 0x5, 0x1efe4576}, {0x4, 0x3, 0x3, 0x80000000}, {0x8000, 0x58c, 0x2, 0x4}, {0x55a, 0x4, 0xfffffffb, 0x8}, {0x3, 0x3ff, 0x80, 0xaba4}, {0x6, 0x0, 0x10000, 0x1}, {0xf9fc, 0x5, 0x2, 0x7}, {0x8, 0x92a, 0xfff, 0x6}, {0x4d, 0x200, 0x0, 0x401}, {0x10001, 0x0, 0x0, 0x9}, {0x2, 0xcfae, 0x1, 0x4}, {0x8, 0x4, 0x0, 0x6}, {0x3, 0x8000, 0x1, 0x1f}, {0x5, 0xfffffffb, 0x0, 0x7f}, {0x401, 0x401, 0x5, 0xf392}, {0x80000001, 0x9, 0x7, 0x2}, {0x800, 0x20, 0xf43, 0x101}, {0x7, 0x7, 0x3, 0x4737}, {0x8ae, 0x6, 0xc7, 0x6}, {0x7, 0x9, 0x0, 0x4}, {0x4, 0x6, 0x6, 0x2}, {0x2, 0x30000000, 0x5, 0x100}, {0x7, 0x1, 0x0, 0x10000}, {0x8076, 0x6, 0x1, 0xcca0}, {0x8000, 0x8, 0x6, 0x6}, {0x8f4, 0xd2965d0e, 0x7, 0x7}, {0x40, 0x6, 0x20, 0x8}, {0x1, 0x7f, 0x3, 0x20}, {0x1000, 0x4, 0x72e6, 0xffffffff}, {0x5, 0xb60, 0x1f, 0x8000}, {0xf5d1, 0x9c65, 0x9, 0x400}, {0x0, 0x7fffffff, 0x7, 0x1}, {0x3, 0x2dc, 0x100, 0x2a}, {0x8, 0x1000, 0x2, 0x9}, {0x8509, 0x1a, 0x8, 0x6}, {0x10001, 0x400, 0x7, 0x80000000}, {0x4, 0x89, 0x0, 0x1167e6b9}, {0x0, 0x2, 0x58}, {0xffff, 0x9, 0x200, 0x3}, {0x7, 0x80000001, 0xfffffffc, 0x3}, {0x0, 0x81, 0x8, 0x48d}, {0x3, 0x8, 0x5}, {0x4, 0x3ff, 0x1f}, {0x0, 0xa1, 0x4, 0x1}, {0x4, 0x6, 0x40, 0x1}, {0x1, 0x800080, 0x5f8, 0x8}, {0x1, 0x4, 0x0, 0xffffffff}, {0x1, 0x1ff, 0x6, 0x80}, {0x6, 0x6, 0xfffffffe, 0x7}, {0x3f, 0x3f, 0x2, 0x3}, {0x2, 0x6, 0x8, 0x8}, {0x6, 0x40, 0x8, 0x1}, {0x6b, 0x6, 0xe2aa000, 0x5}, {0x9, 0x7, 0x401, 0x101}, {0x8, 0x1b15, 0x5, 0x1}, {0x1, 0x810f, 0xaa8e, 0x2}, {0x1, 0xffffff00, 0x0, 0x8}, {0x9, 0x80, 0x4, 0x5}, {0x6, 0x3, 0x40, 0x1f}, {0xa21f, 0x87, 0x6, 0x401}, {0x80000000, 0xf5, 0x0, 0x5}, {0x0, 0x2440000, 0x7, 0x1}, {0xffffffe0, 0x6, 0x2, 0x7}, {0x80000001, 0x4, 0x739c, 0xfc}, {0x1, 0x100, 0x20}, {0xffffffff, 0x200, 0xfffffffe, 0x5}, {0x3, 0x8, 0x35cd, 0x7fff}, {0x8, 0x9, 0x7fff, 0x9}, {0x3, 0x0, 0x7, 0x9}, {0x1, 0x0, 0x2, 0x8000000}, {0xffffffff, 0x10000, 0x4, 0x5}, {0x7, 0x6, 0xfffffc00, 0x8}, {0x3, 0x1f, 0x3ff, 0x6}, {0xffffffc1, 0x4, 0x9}, {0x8001, 0x9, 0x1, 0x40044de0}, {0x4, 0x3, 0x3ff, 0x6}, {0x2, 0x3174, 0x1, 0x401}, {0xffff, 0x2c, 0x0, 0x9}, {0x5, 0x7, 0x6, 0x80}, {0x80000001, 0x1c56, 0x5, 0x58f}, {0x1, 0x0, 0xffffffff, 0x1}, {0x4, 0x9, 0x5, 0x7}, {0x1ff, 0x6, 0xa250, 0x400}, {0x7, 0x3, 0x8}, {0x0, 0x7fffffff, 0x3, 0x579c}, {0x7f, 0x53e53a0, 0x9, 0x5}, {0x80000001, 0x1, 0x83, 0x2}, {0x5, 0x8000, 0x5, 0x6}, {0x1f, 0x5, 0x100, 0xf63}, {0x1, 0x3ff, 0x7f, 0x4}, {0x200, 0x3, 0x6, 0x7fff}, {0x6, 0x7fffffff, 0x858c, 0x6}, {0x3, 0x1, 0x1f, 0xa1}, {0x2f37, 0x800, 0xfff, 0x81}, {0x4, 0x0, 0x0, 0x3f}, {0x7f, 0x6, 0x6206, 0x8}, {0x200, 0x2, 0xd5, 0x7fffffff}, {0x0, 0xfffffffb, 0x12, 0x9}, {0xffffffff, 0x8, 0x6, 0x80000000}, {0x0, 0x1, 0xff, 0x1}, {0x2, 0x0, 0xff, 0x80}, {0x4, 0x7, 0xffff7fff, 0x1}, {0x2, 0x3f, 0x5, 0x282a}, {0xd59, 0x1ff, 0x7}, {0x6, 0x0, 0xa5c, 0x3}, {0x15, 0x7da, 0x5, 0x38f0d865}, {0x7, 0x1, 0x1, 0x7f}, {0x3, 0x5, 0x363c9bd0, 0x80000000}, {0x169, 0xffffffff, 0x8e, 0x38}, {0x0, 0x6, 0x7, 0x5}, {0x2, 0x4, 0x5, 0x4d1f}, {0x1, 0x5, 0xff2, 0x1}, {0x4, 0x7, 0x6, 0x33}, {0x7, 0x6, 0x5, 0x9}, {0x9, 0x6, 0x0, 0xffff0d50}, {0x54, 0x5, 0x5, 0x478}, {0x9, 0x0, 0xfffffff7, 0xffffff00}, {0x2, 0x8001, 0xffff, 0x5}, {0x101, 0x70000, 0xad0, 0x6}, {0xa, 0x5aa, 0x81}, {0x8000, 0x0, 0x0, 0x8}, {0xd33, 0x80000001, 0x87cf, 0x2}, {0x0, 0x2, 0x9, 0x4a716524}, {0x8, 0x5, 0x1, 0xffffffff}, {0x6, 0x5, 0x0, 0x4}, {0x5, 0xd8, 0xffffffff, 0x4}, {0x3, 0x1f, 0x0, 0x3}, {0x1ff, 0x8, 0x10001, 0x6}, {0x400000, 0x50, 0x3, 0x401}, {0x4, 0x0, 0x8}, {0x6, 0x6, 0x5, 0x2}, {0x2, 0x3, 0x2, 0x401}, {0xca, 0x1, 0x4, 0x1}, {0x1, 0x4, 0xffffffff, 0x40}, {0x2, 0x2, 0x80, 0x400}, {0x6, 0xcf99, 0x0, 0xea8b}, {0x1, 0x3, 0x11}, {0x9, 0x8, 0x7, 0xfffffffa}, {0x2, 0x0, 0x0, 0x26df}, {0x5a, 0x8, 0x2, 0x8}, {0x3, 0x800, 0x8, 0x1}, {0x1, 0x101, 0x0, 0x1}, {0x6, 0x4, 0x1, 0x80000000}, {0x7, 0x2, 0xffffffff, 0x5}, {0x8001, 0x1, 0x18, 0x4}, {0x18, 0x0, 0x3, 0x7}, {0x20, 0x1, 0x4, 0x7}, {0x2824, 0x0, 0x80000001, 0x4}, {0x3, 0x2, 0xe7c, 0x9}, {0x4, 0x80000001, 0x239a, 0xf8}, {0x6, 0x0, 0x1b, 0x6}, {0x2b7, 0x6, 0xbd7c, 0x800}, {0x2, 0x7fffffff, 0x2, 0x6}, {0x0, 0x6, 0x3, 0x7}, {0x1ff, 0x6, 0x8, 0xb2}, {0xfffffffb, 0x8, 0x7, 0x3}, {0x1, 0x5, 0x4, 0xffffffff}, {0x6, 0x3625913d, 0x7fff, 0x6}, {0x0, 0x9, 0x73, 0x5}, {0x3, 0x7, 0x6, 0x2}, {0x7fffffff, 0x4, 0x8, 0x3}, {0x8000, 0x7ff, 0x0, 0x2}, {0x896, 0x2, 0x2, 0x9}, {0x10001, 0x2, 0x40, 0x4c}, {0x0, 0x7, 0x1, 0xfffffffc}, {0x8000, 0x1, 0x78f9, 0x5}, {0x6, 0x2, 0xfffffff7, 0xffffc000}, {0x3, 0xffffffff, 0x2, 0x7}, {0xffff, 0x5f0000, 0x4, 0x6}, {0x0, 0x1, 0xffff, 0xe0b00000}, {0x6, 0x80000000, 0x5, 0x4}, {0x0, 0x4, 0x1, 0x4}, {0x1000, 0x0, 0x81, 0x81}, {0x400, 0x8000, 0x3, 0x7}, {0x6, 0x5f2, 0x9, 0x10001}, {0x4, 0x400, 0xa80e, 0x200}, {0x1ff, 0x0, 0x20, 0xff}, {0x8ae3, 0x1, 0x10000, 0x5}, {0x0, 0x3, 0x4, 0x5}, {0x3, 0xb771, 0x8, 0x9}, {0x9, 0xf0e4, 0x0, 0x84e3}, {0x5, 0x3, 0x4, 0x9}, {0x8, 0x8000, 0xc3, 0x9}, {0x8, 0x3, 0x4f92, 0xffff}, {0xa5, 0x7b, 0xda, 0x9}, {0x6, 0x3, 0x6, 0xfffffff7}, {0x80000000, 0x6, 0x8dd0, 0x4}, {0x3, 0x0, 0x1, 0x6}, {0x5, 0x3, 0x44, 0x8}, {0x3, 0x5, 0x7, 0x8}, {0x7, 0x3, 0x80, 0xdec2}, {0x2, 0x7fff, 0xab1d, 0x7ff}, {0x1, 0x8001, 0x1, 0x7fff}, {0x400, 0x5, 0x3ff, 0xf01b}, {0x0, 0x0, 0x75d9, 0xfff}, {0x0, 0x85a, 0xc1b, 0x7}, {0x2, 0x80, 0x0, 0x7}, {0x1c, 0x401, 0x7f, 0x9}, {0xfffffffb, 0x80000000, 0x20, 0x5}, {0x8000, 0x210, 0x4, 0x1}, {0x1, 0x1, 0x800, 0x6b2f0c3b}, {0x9, 0x400, 0x3, 0x3d}, {0x9, 0x0, 0x40, 0x6}, {0x81, 0x2, 0xfffffff7}, {0x0, 0x6, 0x80, 0x5}, {0xfff, 0x5e, 0x800, 0x9}, {0x4, 0x7f, 0x3f, 0xfff}, {0x81, 0x7, 0x4, 0x1}, {0x400, 0x7, 0x80000000, 0x3}, {0xfffffffe, 0x400, 0x8, 0x2}, {0x4, 0x1ff, 0x1, 0x9}, {0x8000, 0xffffffff, 0x8, 0x7fff}, {0x8, 0x7, 0x8, 0x8}, {0x6, 0x6, 0x7, 0x4}, {0x81, 0xfffffffa, 0x101, 0x1}, {0x4, 0x40, 0x96b}, {0x1000, 0x6, 0x1ff, 0x3}, {0x4, 0x2, 0x0, 0x7}, {0xffff, 0x9, 0x33, 0x1}, {0x4, 0xffff, 0x9, 0xfffffffe}, {0x81, 0x8, 0x22, 0x101}, {0xffff, 0x9, 0x1, 0x8}, {0xdd3, 0x4, 0x80000000, 0x8}, {0x3, 0xae3, 0x0, 0x200}, {0x8, 0x2, 0x6, 0x200}, {0x5b5, 0x401, 0x9c, 0x1}, {0x1f, 0x6a7, 0x3, 0xfff}, {0xa6a, 0x0, 0x0, 0x5}, {0x0, 0x401, 0x6, 0x8}, {0x4, 0x2, 0x80000001, 0x6}, {0xe092, 0x8, 0x4, 0x4}, {0x7ff, 0x4, 0x7, 0x1}, {0xc6, 0x6, 0x1f, 0x1}, {0x0, 0x10001, 0xfffffffa, 0x3}, {0x2, 0x3ff, 0xf3, 0x1}, {0xffffffff, 0x4, 0x6, 0x3ff}, {0xa6, 0x7, 0x9133a4a, 0xcd78}, {0xaef, 0x80000000, 0x4, 0x514}, {0x1, 0x5, 0x229, 0x6}, {0x7, 0x10000, 0x3, 0x1}, {0x9, 0x3, 0x4, 0xffffff00}, {0x288, 0x3f, 0x8c5, 0xffffffe0}, {0x5, 0x291d00, 0x3, 0x2}, {0x0, 0x3, 0x40, 0x5}, {0x4, 0x1f, 0x40, 0xfffffff7}, {0x1, 0x9, 0x7f, 0xff}, {0x9, 0x5, 0x3, 0x7fff}, {0x6, 0x1, 0x8000, 0x3}, {0xf45d, 0x7, 0x5, 0x3ff}, {0x7, 0x2, 0x6, 0x1}, {0x7, 0x7fff, 0x6, 0x7ff}, {0x0, 0x6, 0x10000, 0x9}, {0x4, 0x2, 0x4}, {0x0, 0x5, 0x7fffffff, 0xfff}, {0xffffffff, 0x7d, 0xf8, 0x400}, {0x1000, 0x0, 0x1, 0x9}, {0xfffffffe, 0x3, 0x4, 0x3}, {0x100, 0x1, 0x9, 0x200}, {0x0, 0x7fffffff, 0x7, 0x4}, {0x6, 0xc9d, 0x1, 0x6}, {0x1, 0x9, 0x10000, 0xffffffff}, {0xff, 0x9, 0x7}, {0x800, 0x101, 0x4, 0x6b}, {0x63, 0x8, 0x82c1, 0xa6}, {0x101, 0x8001, 0xffff05ae, 0xf1e}, {0x624a, 0x1ff, 0x1, 0x8}, {0x2, 0x9, 0x400, 0x7fffffff}, {0x800, 0x64, 0x8, 0x6}, {0x8001, 0x0, 0x7fff, 0x1ff}, {0xffff, 0x2, 0x89, 0x2}, {0x6, 0x3, 0x3, 0x9}, {0x10100, 0x20000, 0x2, 0x80000000}, {0x7fffffff, 0x1, 0x23}, {0x3, 0x4, 0x1, 0x4}, {0x7fffffff, 0x6, 0x0, 0x1}, {0x3ff, 0x1, 0x7, 0x2}, {0xfffffeff, 0x9, 0x10000, 0x4}, {0x1, 0x2, 0x5, 0xffffffff}, {0xffffffff, 0x6, 0x3, 0x2}, {0x8, 0x7, 0x6, 0x10000}, {0x80000001, 0x5, 0x1, 0x800}, {0x2, 0xfffffffd, 0x2, 0x81}, {0x808, 0xfffffffc, 0x3ff, 0x5}, {0x9, 0x0, 0x6, 0xfff}, {0x4, 0x1, 0xeb, 0x80000000}, {0xffffffff, 0x8, 0xdcf, 0x99b}, {0x1000, 0x3, 0x6, 0x6}, {0x5, 0x5, 0x3, 0x100}, {0x1, 0xfff, 0x8, 0xdd9d}, {0x7, 0x80000000, 0xffffffff, 0x80}, {0xd1, 0x401, 0x5, 0x401}, {0x24000000, 0x4, 0x7}, {0x1a3, 0x3, 0xef26, 0x7ff}, {0xa7, 0x7ff, 0x6, 0x10001}, {0x6, 0x3, 0x1, 0x57ca}, {0x0, 0x0, 0x4, 0x9}, {0x1, 0x7ff, 0x7fffffff, 0x4}, {0x4, 0x3, 0x6, 0x2}, {0x7, 0x8, 0xe9800000, 0x9}, {0x5, 0xc85, 0x1, 0x6b000000}, {0x1f, 0xfffffff7, 0x4, 0xfffffffa}, {0x5, 0x200, 0x1, 0x8}, {0x4, 0x8, 0x9, 0x14c4}, {0x0, 0x9, 0xfffffffe, 0x401}, {0x1f, 0x18f, 0x9}, {0x0, 0x54, 0x800, 0x9}, {0x2, 0x3f180, 0x241d, 0x7}, {0x7fffffff, 0xc3d, 0x5, 0x7}, {0x8, 0x7, 0x1, 0x9}, {0x3, 0xfffffffd, 0x8, 0x10001}, {0x80000000, 0x7000, 0x8001, 0x3}, {0x8, 0x8001, 0x8000, 0x4}, {0x9, 0x2, 0x9, 0xdb11}, {0x2, 0x5, 0x40, 0x3}, {0x0, 0x3, 0xb63, 0x5}, {0x420b, 0xffff, 0xffffffff, 0x7}, {0x8, 0xaf2, 0x31c5, 0x1f}, {0x800, 0x7, 0x7fffffff, 0xffff}, {0x1, 0x8, 0x3, 0x2}, {0x80000001, 0x7f, 0x80000001, 0x8}, {0x4, 0x7, 0xd4, 0xcd}, {0x6422, 0x8, 0x4, 0x8}, {0x3ff, 0x7, 0x80000000}, {0x7, 0x5, 0x8, 0x10000}, {0x7f, 0x2, 0x7ff, 0x7ff}, {0x8000, 0x4b, 0x2, 0x81}, {0x3f, 0x1, 0xf9, 0x3}, {0xff, 0xfffff000, 0x79b5eca9, 0x8}, {0x3, 0xfffffffc, 0x0, 0x2}, {0x2, 0xfba, 0x4, 0x40}, {0x6, 0x5, 0x4, 0xffffffff}, {0x4, 0x8, 0x7, 0x9}, {0x0, 0x80000001, 0xfffffff9, 0x5}, {0x80000001, 0x7ff, 0x0, 0x401}, {0x400, 0x5, 0x4, 0x2}, {0x5, 0x1000, 0x8, 0x1f}, {0x8, 0x5, 0x2}, {0x4, 0x7fffffff, 0x9, 0x200000}, {0x1, 0x800, 0x8, 0xff}, {0xfff, 0x7f, 0x6, 0x1f}, {0x9, 0x8, 0x2be, 0x7ff}, {0x3f, 0xffff, 0x1, 0x3}, {0xd9, 0x6, 0x6cf4, 0x8}, {0x800, 0x2, 0x0, 0x80000001}, {0x4, 0x2a, 0x1, 0xffffffaf}, {0x7fffffff, 0x3, 0x7, 0x7}, {0x9, 0x80000000, 0xf031, 0x10000}, {0x81, 0x4, 0xb8, 0xc6}, {0x0, 0x3, 0x5, 0x100}, {0x7fff, 0x5, 0xc44, 0x1000}, {0x6f, 0xf0, 0x1, 0x3}, {0x6, 0x5, 0x80000001, 0x3}, {0x2, 0xff, 0x3, 0x2}, {0x4, 0x1, 0xfffffff8, 0x8}, {0x1, 0x6, 0x3, 0x3}, {0x8589, 0xfffff801, 0x80000001, 0x7}, {0xf4, 0x401, 0x4222, 0x1f80}, {0x1, 0x4, 0xffffa159, 0x1000}, {0x6, 0xfff, 0x3f, 0x4}, {0xffffffe3, 0x2, 0x3, 0x6}, {0x10001, 0xfd, 0x4000, 0x1ff000}, {0x1, 0x8, 0x1f, 0xffffff7f}, {0x0, 0x7, 0x1, 0x5}, {0x0, 0x7fff, 0x4, 0x5}, {0x8, 0x7, 0x7, 0x5}, {0x5, 0x10001, 0xfffffffa, 0xffff52c4}, {0x3, 0x9, 0x7, 0x2}, {0x3, 0xffffffff, 0x8, 0x6}, {0x1, 0x8c1d, 0x3}, {0x5c, 0x1f, 0x1e9, 0xfffffffd}, {0xc0, 0x4, 0xffff, 0x100}, {0x3, 0x395, 0x9, 0x3ff}, {0x4, 0x7, 0x80000000, 0x4}, {0x1, 0x7, 0x7, 0xfffffff9}, {0x3e, 0x0, 0x2, 0x5}, {0x98, 0x9, 0xfff, 0x6}, {0x7f, 0x2, 0x2, 0x7c600000}, {0x8, 0x7fffffff, 0x200, 0x1}, {0x0, 0x1ff, 0x8, 0x7}, {0x200, 0x7, 0x4, 0xa82}, {0x1ff, 0x9, 0x7ff, 0x4}, {0x6, 0xff800000, 0x40}, {0x1, 0x6, 0x5, 0xfffffff8}, {0xf7e6, 0x5, 0x20, 0x8001}, {0x72, 0x5, 0x9, 0x3}, {0x62, 0x5, 0x80000001, 0x3ff}, {0x5, 0x1, 0x2, 0x349}, {0x4, 0x6, 0xffff, 0x5}, {0x5, 0xfffffffb, 0x1}, {0x1, 0x6, 0x7fffffff, 0x6}, {0x0, 0x7, 0x1000, 0x8001}, {0x4, 0x8, 0x40, 0x4b}, {0x9, 0x8, 0x2, 0xdfa}, {0x84, 0x2, 0x3, 0x6}, {0x228, 0x4, 0x4, 0x7}, {0x8, 0x6, 0x6, 0x52c}, {0x4, 0x1ff, 0x8, 0x100}, {0x0, 0xfff, 0x7, 0x2}, {0x7, 0xe4f3, 0xffffff73, 0x3}, {0x9, 0x7, 0x9, 0x10001}, {0x9, 0x80, 0xffffffff, 0x401}, {0xff, 0xe0, 0x800, 0x6}, {0x101, 0x3, 0x4, 0x101}, {0x3, 0xfffffffe, 0x5, 0x81}, {0x5, 0x7de4e49, 0x16, 0x200}, {0xffffffff, 0x0, 0x101, 0x5}, {0x786f, 0x9, 0x200000, 0x9}, {0xffff, 0x80000000, 0xf50f, 0xfffffc00}, {0xb5e, 0x8000, 0x5e, 0x9}, {0x1, 0x4, 0x3e27d7e0, 0x8}, {0x66c59cd, 0x3, 0xde06, 0x1}, {0x3, 0xc946, 0x2f8, 0x819}, {0x20, 0x80000001, 0x8, 0x5}, {0x3, 0x9, 0x6, 0x73b4}, {0x3e47, 0x20, 0x4, 0x1}, {0x6, 0x7ff, 0x7, 0x40}, {0x2, 0xfffffe01, 0x7f, 0x6}, {0x2, 0x1, 0x0, 0x3}, {0x40, 0x31a, 0x7fffffff, 0x7f}, {0x1f, 0x3, 0x5b0, 0x7}]}, 0x29a5) syz_open_procfs$namespace(0x0, 0x0) 16:43:52 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x1}, 0x2}, 0x18) socket(0x28, 0x80000, 0xd960) 16:43:52 executing program 2: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000002140), &(0x7f0000002180)=0x4) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) getsockopt$inet6_dccp_int(r0, 0x21, 0x11, &(0x7f0000000000), &(0x7f0000002100)=0x4) 16:43:52 executing program 1: setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), 0x4) getresuid(0x0, 0x0, 0x0) 16:43:52 executing program 0: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f00000000c0)=""/10, &(0x7f0000000100)=0xa) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/ipc\x00') 16:43:52 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x2000000) 16:43:52 executing program 4: syz_open_procfs$namespace(0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x800, 0x70bd2d, 0x81, {}, [@GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x400c084) 16:43:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x3, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000000400)={0x4, 0xd, 0x7f, 0x80}, &(0x7f0000000440)=0x1f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x400}}, 0x10) r1 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) keyctl$set_timeout(0xf, r1, 0x1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={r2, 0xc5, 0x3e}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'nhpoly1305\x00'}}, &(0x7f0000000140)="fbc6c4e681c8bad272ceb3e1523a66793f86930e5492616cf96a825dcf0e14de8428d1a4dd0bdfd81e910e4877bf3c1edb5e3e5e4279532faa7a12a5b1a87400e7a20f1826c0c3fe2a950ecd5897ad30cbc4cbbde40e5b88a720162002b0d773d7a5fa9a21333f67b36b3de95534659dd20d85f3fa2b82d1cb65526f0d49cb8c9ab96e97e82a77d59298a3332325ffecb8a1f0b853ad39b7949307eea3f03dc646d5225c6dc17c2a3c3b44df3f6366c50a1690d579e634e3655f08cff16e80aa91d5b07d47", &(0x7f0000000240)=""/62) getresuid(0x0, 0x0, 0x0) 16:43:52 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) socket(0x28, 0x80000, 0xd960) 16:43:52 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000080), 0x0) 16:43:52 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x0) 16:43:52 executing program 0: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f00000000c0)=""/10, &(0x7f0000000100)=0xa) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/ipc\x00') 16:43:52 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) socket(0x28, 0x80000, 0xd960) 16:43:52 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/mnt\x00') sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r0, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_NET_NS_FD={0x8, 0x7, r1}, @GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_TID={0xc}, @GTPA_I_TEI={0x8, 0x8, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4c041) 16:43:52 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x40010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x23456}, 0x1) 16:43:52 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000011c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001180)={&(0x7f00000000c0)={0x10b0, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x48, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}]}]}, @TIPC_NLA_NODE={0x1028, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ID={0x1004, 0x3, "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"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffa8}]}]}, 0x10b0}, 0x1, 0x0, 0x0, 0x80}, 0x1) getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) 16:43:52 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x0) 16:43:52 executing program 0: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f00000000c0)=""/10, &(0x7f0000000100)=0xa) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/ipc\x00') 16:43:52 executing program 1: ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(0xffffffffffffffff, 0xc1004111, &(0x7f0000000000)={0x7, [0x20, 0x7fffffff, 0x7f], [{0x9, 0x5, 0x1, 0x1}, {0x7fffffff, 0x5faf, 0x1, 0x0, 0x1}, {0xf0d3, 0x40000000, 0x1, 0x1, 0x0, 0x1}, {0x5, 0x7, 0x1, 0x0, 0x1, 0x1}, {0x2, 0x81, 0x0, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x0, 0x0, 0x1}, {0xff, 0x1, 0x0, 0x1, 0x1}, {0xfffffffe, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x0, 0xff, 0x0, 0x1, 0x1, 0x1}, {0x0, 0x1, 0x1, 0x1, 0x1}, {0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x8}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) getresuid(0x0, 0x0, 0x0) geteuid() 16:43:52 executing program 4: r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(r0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x7}) getpgrp(r0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) bind$pptp(r3, &(0x7f0000000200)={0x18, 0x2, {0x3, @loopback}}, 0x1e) r4 = getpgrp(r0) getpgrp(r4) syz_open_procfs$namespace(r4, 0x0) r5 = openat$incfs(r2, &(0x7f0000000040)='.log\x00', 0x80000, 0xd2) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000080)) 16:43:52 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) socket(0x28, 0x80000, 0xd960) 16:43:52 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x4180, 0x0) 16:43:52 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x0) 16:43:52 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f00000013c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000003400)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x80, 0x4) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x10040, 0x101) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000001380)={0x0, 0xa7, 0x4, 0x800}, 0x8) 16:43:52 executing program 0: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f00000000c0)=""/10, &(0x7f0000000100)=0xa) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') 16:43:52 executing program 3: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$incfs(r0, &(0x7f0000001700)='.log\x00', 0x40640, 0x180) socket(0x28, 0x80000, 0xd960) 16:43:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000000)) getresuid(0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000001, 0x2010, 0xffffffffffffffff, 0x8000000) 16:43:53 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) geteuid() 16:43:53 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x0) 16:43:53 executing program 4: syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) 16:43:53 executing program 3: getresuid(0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) socket(0x28, 0x80000, 0xd960) 16:43:53 executing program 0: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_procfs$namespace(0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') 16:43:53 executing program 1: r0 = getpgrp(0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@ax25={{0x3, @netrom}, [@remote, @netrom, @remote, @null, @bcast, @rose, @bcast, @bcast]}, &(0x7f0000000100)=0x80) r2 = accept4$packet(r1, 0x0, &(0x7f00000000c0), 0x800) r3 = accept4$packet(r2, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002340)=0x14, 0xc386ee066c40d2c0) accept(r2, &(0x7f0000002380)=@can={0x1d, 0x0}, &(0x7f0000002400)=0x80) bpf$MAP_CREATE(0x0, &(0x7f00000021c0)={0x10, 0x0, 0xfff, 0x5, 0x82, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x2}, 0x40) setpriority(0x2, r0, 0x656b) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000002540)={&(0x7f0000002180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002500)={&(0x7f0000002440)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="00032dbd7000fedbdf25110000003c0001801400020076657468305f746f5f626f6e640000001400020084656e65766531000000e8000100000000000000", @ANYRES32=r4, @ANYBLOB="08000300020000003800018008000100", @ANYRES32=0x0, @ANYBLOB="140200006d61637365633000000000000000002f6442cb1b", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="00e2b1bc", @ANYRES32=0x0, @ANYBLOB], 0x88}, 0x1, 0x0, 0x0, 0x4000800}, 0x4008890) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002800)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x0) getresuid(0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x18, 0xfffffffb, 0x2, 0xe7d, 0x800, 0xffffffffffffffff, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1}, 0x40) recvmsg(r3, &(0x7f00000022c0)={&(0x7f0000002200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002280)=""/21, 0x15}, {&(0x7f0000002580)=""/243, 0xf3}, {&(0x7f0000002680)=""/108, 0x6c}, {&(0x7f0000002700)=""/201, 0xc9}, {&(0x7f0000002c40)=""/197, 0xc5}, {&(0x7f0000002900)=""/142, 0x8e}, {&(0x7f00000029c0)=""/73, 0x49}, {&(0x7f0000002a40)=""/179, 0xb3}], 0x8, &(0x7f0000002b80)=""/156, 0x9c}, 0x10102) 16:43:53 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000080), 0x0) 16:43:53 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f00000013c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000003400)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x80, 0x4) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x10040, 0x101) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000001380)={0x0, 0xa7, 0x4, 0x800}, 0x8) 16:43:53 executing program 4: ioctl$SNDRV_PCM_IOCTL_STATUS64(0xffffffffffffffff, 0x80984120, &(0x7f0000000000)) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = add_key$fscrypt_v1(&(0x7f00000081c0), &(0x7f0000008200)={'fscrypt:', @desc1}, &(0x7f0000008240)={0x0, "3ba5bb9d406fba8d502e92faa5b2735eab227cdae70afb206f1d901af2b3bbc576f22e0bb7ceefcf960e5747c87d69957eae77e04d3d69384c31cf8b7fa4766e", 0x40}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000082c0)='rxrpc_s\x00', 0x0) getpgrp(r0) read$FUSE(0xffffffffffffffff, &(0x7f0000004140)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000006180)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = getpgrp(r2) syz_open_procfs$namespace(r3, 0x0) 16:43:53 executing program 3: getresuid(0x0, 0x0, 0x0) socket(0x28, 0x80000, 0xd960) 16:43:53 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) geteuid() 16:43:53 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x6, 0x110, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x4004, @fd, 0xe09, 0x0, 0x0, 0x12, 0x0, {0x2}}, 0x6) 16:43:53 executing program 0: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') 16:43:53 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f00000013c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000003400)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x80, 0x4) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x10040, 0x101) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000001380)={0x0, 0xa7, 0x4, 0x800}, 0x8) 16:43:53 executing program 3: socket(0x28, 0x80000, 0xd960) 16:43:53 executing program 4: syz_open_procfs$namespace(0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) r0 = getpgrp(0x0) sched_rr_get_interval(r0, &(0x7f0000000000)) 16:43:53 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) clock_gettime(0x0, &(0x7f0000000000)) 16:43:53 executing program 0: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') 16:43:53 executing program 1: getresuid(0x0, 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000000)={0xb0, 0xfffffffffffffffe, 0x0, [{{0x4, 0x1, 0x3, 0x100, 0x10000, 0x401, {0x3, 0xee6, 0x6, 0x1ff, 0x2a1, 0x703, 0xba0c, 0x80000000, 0x1f, 0x8000, 0xff, 0x0, 0xffffffffffffffff, 0x7, 0xfffff97e}}, {0x4, 0xfffffffffffffff9, 0x7, 0x7fff, '%}])[$+'}}]}, 0xb0) 16:43:53 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f00000013c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000003400)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x80, 0x4) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x10040, 0x101) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000001380)={0x0, 0xa7, 0x4, 0x800}, 0x8) 16:43:53 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000), 0xfffe, 0x109000) r1 = syz_open_dev$binderN(&(0x7f00000000c0), 0x0, 0x800) r2 = mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x1) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x90, 0x0, &(0x7f00000002c0)=[@register_looper, @dead_binder_done, @release={0x40046306, 0x1}, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000200)={@fd={0x66642a85, 0x0, r0}, @flat=@handle={0x73682a85, 0x1103, 0x3}, @ptr={0x70742a85, 0x0, &(0x7f0000000100)=""/217, 0xd9, 0x2, 0x1a}}, &(0x7f0000000280)={0x0, 0x18, 0x30}}}, @free_buffer={0x40086303, r2}, @enter_looper, @enter_looper, @dead_binder_done, @increfs_done={0x40106308, 0x1}], 0x6f, 0x0, &(0x7f0000000380)="3554bbc40db4e00aabff7f428798767057b3e6031d2619a5b312ef97a96076e8308be1b26508ac27ff5cf73b4d03a65121c184b5ac83299acd8f434dc0019fb4f27f66f33bb20669a276100b74b1698a3f97d946fe56815a56796d4c68f696aed1bcb52a147427c6314fffda07e65a"}) 16:43:53 executing program 3: socket(0x0, 0x80000, 0xd960) 16:43:53 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000001240)=@nfc, &(0x7f00000012c0)=0x80) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={{r3, r4/1000+10000}, {r5, r6/1000+10000}}, 0x100) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}}, &(0x7f0000000040)='syzkaller\x00', 0x6, 0x0, &(0x7f0000000080), 0xc0f00, 0x9, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x4, 0x9, 0x1bfb126f, 0x8ea}, 0x10, 0xffffffffffffffff, r2}, 0x78) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000001300), &(0x7f0000001340)=0x4) r7 = getpgrp(0xffffffffffffffff) r8 = getpgrp(r7) syz_open_procfs$namespace(r8, 0x0) 16:43:53 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') 16:43:53 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f00000013c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000003400)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x80, 0x4) openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x10040, 0x101) 16:43:53 executing program 1: getresuid(0x0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x40}, 0x8) 16:43:53 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000000)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getresuid(&(0x7f0000000040), &(0x7f00000000c0), 0x0) openat$incfs(r0, &(0x7f0000000100)='.log\x00', 0x400000, 0x106) 16:43:54 executing program 3: socket(0x0, 0x80000, 0xd960) 16:43:54 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f00000013c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000003400)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x10040, 0x101) 16:43:54 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = syz_usbip_server_init(0x3) write$usbip_server(r0, &(0x7f0000000000)=@ret_submit={{0x3, 0x1, 0x0, 0x0, 0xff}, 0x9, 0xe9, 0x5, 0x257, 0xa1e6, 0x0, "7f53a605ecd2a1c2eba8aa205399f65886ff3ffc6a4eb4f1c138bd93272780b04d93e36fcc047fa324cbcaa32f84842c6e1d3192c9181bd48dc91b2722cef6dc0a5d87532e4cbb13e77da9be6d0e80be0f832bb5d66648e79d84bf45566fcbb62ccf0fb73badeb991fa7b095bba85ffbf6ced8c00c7df1802a1357317570deb6ae5b640ba0a84a20e72a058b7a7a7dfe5b6add17479d009679cf0a49afcf627e332a12210557edb116cbdf8d617547d21126b3df24f719fe24be1a256c54287099b7a4488a1cc90a23142903e83028dd7bc5c6fcdb9619b2d7b344b7d83ca7585d2e50c872a59697e8", [{0x4, 0xc0, 0xffff8124, 0x6}, {0x5, 0x3, 0xc5, 0x5}, {0x5, 0xae, 0x7f, 0xfffffffc}, {0x7ff, 0x1, 0x3830afb6, 0x9}, {0x80000000, 0xffff, 0x9ddc, 0xfffffff4}, {0x7fffffff, 0x41, 0x7a2d, 0x5}, {0xfffffffa, 0x3, 0x1, 0x1ff}, {0xace, 0x6, 0x9, 0xc8}, {0x2, 0x3, 0x40, 0x9}, {0x1000, 0x6000000, 0x9, 0x100}, {0x6, 0x3f, 0x9, 0xfffffff7}, {0x9, 0x1, 0x4}, {0x8, 0x5f1f, 0x800, 0xfffffffa}, {0x2, 0x0, 0x40, 0x1}, {0x3, 0x10001, 0x4e, 0x7}, {0x1, 0x6, 0x3b, 0x8}, {0x1, 0xf6, 0xfffffc73, 0x80}, {0x6c, 0x1, 0x100, 0x8}, {0x2, 0xffff0f1b, 0xc9d0, 0x8bf}, {0x0, 0x0, 0x100, 0x3}, {0x3, 0x7, 0x1f, 0x3}, {0x1ff, 0x101, 0xffff, 0xfffffff9}, {0x0, 0x0, 0x2, 0x4}, {0x7, 0x4, 0x2, 0x2}, {0x8, 0xfffffffb, 0x7e9}, {0x401, 0x83, 0x10001, 0x4}, {0x0, 0x9, 0x7, 0xffffff5b}, {0x6, 0x8001, 0x80000001}, {0x644, 0x8b, 0x3, 0x8000}, {0x1, 0x8, 0x3, 0x200000}, {0x5, 0x9, 0x5, 0xffffff36}, {0x1, 0x7, 0x7, 0x5}, {0x80000000, 0x5, 0xffff, 0x1}, {0x2, 0x5, 0x8, 0x1bf6}, {0x7f, 0xc2, 0x4, 0x3}, {0x100, 0x9, 0x6, 0x5}, {0xb7, 0x8001, 0x2, 0x20}, {0x56, 0x1f, 0x6475, 0x3}, {0x101, 0x5, 0x3cd0011a, 0x5}, {0xfff, 0x8000, 0xc460, 0x4}, {0xffffffff, 0x3, 0xe7, 0x7}, {0xffffa297, 0x9, 0x4, 0x80000001}, {0x40, 0x5, 0x4, 0x28000}, {0x0, 0x6, 0xfffffd51, 0x5}, {0x3, 0x9, 0xfffffffc, 0x4}, {0x0, 0x3, 0x7, 0xa79}, {0x9, 0x5, 0x2, 0x3}, {0xfffffffb, 0x8, 0x9b, 0x8}, {0xffffffff, 0x40, 0xff, 0x6}, {0x2, 0x2, 0x100, 0xdf}, {0x1f, 0x8, 0x1, 0xeb28}, {0x7, 0x1, 0x3, 0xfad7}, {0x5a, 0x5684, 0x0, 0x3}, {0x9, 0x100000, 0xf4d}, {0xfffffd58, 0x7, 0x5, 0x7f5c}, {0x81, 0x8, 0x1, 0x4}, {0x0, 0x6, 0x9, 0x6}, {0x8, 0x0, 0x3ff, 0xffffffff}, {0x800, 0x8, 0x2, 0x8}, {0x2, 0x5, 0x7, 0x8}, {0xfffffffa, 0x3, 0x4, 0x1}, {0x200, 0x401, 0x5, 0x9}, {0x49f, 0x1ff, 0x7, 0xfff}, {0x6129, 0x10000, 0x70c0, 0x7}, {0x1, 0x0, 0x3f, 0x3ff}, {0x80000001, 0x0, 0x0, 0x8ba}, {0x10000, 0x3, 0x0, 0x6}, {0x6, 0x79f4, 0x1ffd463d, 0x5}, {0x6, 0x0, 0x6, 0x5855}, {0x40, 0x5, 0x6, 0x8}, {0x101, 0x8000, 0x7, 0x8}, {0x40, 0x7fff, 0xffff8001, 0x4}, {0xfffffffb, 0x1, 0x4018c311, 0xb25f}, {0x5, 0x1, 0x80, 0xeccd}, {0x1f, 0x5, 0x401, 0xfff}, {0x2, 0x81, 0x9, 0x5}, {0x9a1b, 0x65, 0x9, 0x1}, {0x23d, 0x80000001, 0x5, 0x9}, {0x5, 0x4, 0x61f9, 0xfff}, {0x20, 0x7ea, 0x80000000, 0x7}, {0x5, 0x6, 0x2, 0x10001}, {0x9a, 0x0, 0x6, 0xfff}, {0x6, 0x6, 0x7fffffff, 0x8}, {0xf2, 0x3, 0x7fffffff, 0xfa}, {0x6, 0x8, 0x8, 0x10000000}, {0xfffffb8b, 0x200, 0x400, 0x9c}, {0x83, 0x73a, 0x5, 0xe310}, {0x7, 0x84, 0x1, 0x7fffffff}, {0x24a, 0x80000001, 0x384, 0x101}, {0x9, 0x800, 0x6, 0x7}, {0xb34, 0x800, 0x7c74, 0x4}, {0x2, 0x80000000, 0x400, 0x1}, {0x1, 0x7fffffff, 0x80000000, 0x13}, {0x8, 0x200, 0x7, 0x1ff}, {0x1d22, 0x9, 0x2, 0x4}, {0x4, 0x0, 0x7fff, 0x2}, {0x0, 0x4, 0x0, 0x6}, {0x56c3b7a4, 0x1, 0x0, 0x1}, {0x1ff, 0xffffffff, 0x1, 0xe0b}, {0x6, 0x1, 0x9a, 0x5a}, {0x0, 0x5, 0x20}, {0xfffffff7, 0x8, 0x6, 0x285b0}, {0x1ff, 0x80, 0x8001, 0x2b}, {0xfffffffb, 0x4, 0x1, 0xff}, {0xfff, 0x401, 0x6b0, 0x8001000}, {0x2, 0x7, 0x3f, 0xfec}, {0x7, 0x5, 0x3, 0x10000}, {0x20, 0xfff, 0x8, 0x3}, {0x2, 0x2e83, 0x9, 0xffffff80}, {0x25, 0x6, 0x3, 0x1000}, {0x9, 0x6, 0x0, 0x5}, {0x401, 0x0, 0x1, 0xf5}, {0x8, 0x6, 0x9, 0x8000}, {0x7, 0x1, 0x2, 0x5}, {0x3, 0x5, 0x8, 0x1}, {0xa8c, 0x8, 0x1, 0x5}, {0x5, 0x7fffffff, 0x40c9, 0x7}, {0xfff, 0x6, 0x4, 0x3}, {0xff, 0x0, 0x9, 0x4}, {0xab7e, 0x3f, 0xfff, 0x9}, {0x0, 0x7fffffff, 0x4, 0x15c}, {0xfffffff8, 0x1, 0xbc, 0x1}, {0x5, 0x8f3, 0x9, 0x4}, {0x4, 0x6f, 0x80, 0x9}, {0x3, 0x7fffffff, 0x2f609b4c, 0x4}, {0x79d, 0x1}, {0x8, 0x3, 0x1f, 0x2a2}, {0x1, 0x7fff, 0x5, 0xffff}, {0x67, 0x401, 0x101, 0x1ff}, {0x8, 0x5, 0x80000000, 0x5}, {0x3, 0x1ff, 0x80, 0x80000000}, {0x1d, 0x5, 0x101, 0x1}, {0x6, 0x6, 0x1, 0x8001}, {0x4, 0x100, 0x81, 0xffffffff}, {0x8001, 0x2, 0xffffff1f, 0x2}, {0x9, 0x10000, 0x0, 0x7fff}, {0x7, 0x3, 0x9, 0xec}, {0x1, 0x0, 0x10001, 0xe7dc}, {0x1, 0x7, 0x52, 0x5}, {0x5, 0x5, 0x5, 0xffffffff}, {0x1, 0x11, 0x401, 0x200}, {0x26d29852, 0xadd, 0x10000000, 0x6}, {0x7, 0x42, 0x3, 0x8001}, {0x7, 0x6e4, 0x9, 0x20}, {0x80000001, 0x1, 0xffffffe0, 0x3}, {0x1, 0x1, 0xa5, 0xffff}, {0x6, 0x3, 0x6, 0x7}, {0x101, 0x8, 0x9, 0x80000001}, {0x1, 0xffffff01, 0x3, 0xfffffff9}, {0x400, 0x140000, 0x3, 0x1}, {0x6, 0x0, 0x1}, {0x0, 0x40, 0x1, 0x98}, {0x10001, 0x3, 0x9, 0xffffffff}, {0x8000, 0xe2, 0x8, 0x100}, {0x1, 0xd8, 0x7ff, 0x10001}, {0x2, 0x2, 0x8, 0x200}, {0xfffffffd, 0x5, 0x101, 0x338}, {0x101, 0x7, 0x6, 0x1}, {0x10000, 0x8, 0x3, 0x3ff}, {0x8, 0xd394, 0x6, 0x4}, {0xfffffff7, 0x3, 0x5, 0x6e}, {0x3, 0x35, 0x8f51, 0xfff}, {0x9, 0x6, 0x8, 0x3}, {0x101, 0x7ff, 0xfffffff7, 0x3}, {0x1, 0x81, 0x1, 0x3}, {0x69db, 0x4, 0xffff, 0x800}, {0x9, 0x7, 0x5, 0x3}, {0x8, 0x80000000, 0x6ff, 0xffffa0c2}, {0x400, 0xffff, 0x0, 0xfb}, {0x3, 0x3, 0x100, 0x3}, {0xfffffffe, 0xfffffe00, 0x1, 0x9}, {0xfffffff8, 0x0, 0x7ff, 0x1}, {0x81, 0xfff, 0x8, 0x8}, {0x8, 0x10000, 0x71, 0x1}, {0x0, 0x8, 0x7, 0x400}, {0x4, 0x7ff, 0x2, 0x6}, {0xd380, 0xd2ed, 0x10000, 0x32886c2e}, {0x1, 0xffffffff, 0x3ff}, {0x1000, 0x10000, 0x2, 0xc22}, {0x6, 0x5, 0x7, 0xfffffff7}, {0x7f, 0x7ff, 0x469, 0xc3c}, {0x636, 0x6, 0x8, 0x1}, {0x2, 0x2, 0xec4b, 0x7}, {0x80000001, 0x4, 0x1000, 0x3}, {0xa4, 0x0, 0x81, 0x8}, {0x9, 0x0, 0x6, 0x1f}, {0x8e48683, 0x5, 0x80000000, 0x2}, {0x3f, 0x62, 0xffffffff, 0xc7}, {0x6, 0x7, 0x1c, 0x1}, {0xfffff801, 0x4d0, 0x77d, 0xfff}, {0x3, 0x6, 0x4, 0xcc0}, {0xffff6d3e, 0x7, 0xff, 0x3ff}, {0x7, 0x4, 0x5, 0x3f}, {0x1000, 0x2, 0x5, 0x9}, {0x8, 0x1, 0x4}, {0x5, 0x5, 0x3, 0x1}, {0x4, 0x2, 0x0, 0xff}, {0x800, 0x0, 0x100, 0x1d3d63fc}, {0x8, 0x9, 0x1000, 0x5c4f19d3}, {0x8, 0x8, 0x101, 0xff}, {0x7, 0x2, 0x5, 0x20}, {0x2, 0x0, 0x2, 0x200}, {0x2, 0x8, 0x6, 0x864}, {0x2, 0x5446b9cb, 0x8, 0x1f}, {0x6, 0x3, 0x0, 0x401}, {0x4, 0x3, 0xc9, 0x5}, {0x81, 0x5, 0x40, 0x100}, {0x1000, 0x1, 0x9, 0x8}, {0x1, 0x7, 0x7, 0xfffffffe}, {0xfffeffff, 0x1ea4ca8d, 0x6f3, 0x974}, {0x7fff, 0x3, 0xc2e, 0x9}, {0x9, 0x7f, 0x2, 0x800}, {0x2, 0x97, 0xee9, 0x370e}, {0xfffffffc, 0x3ff, 0xf5, 0xfffffffb}, {0x0, 0x1, 0x5, 0x687}, {0xe00a, 0x4000400, 0x3, 0x1}, {0x81, 0x167, 0x80000000, 0x1f}, {0x7ff, 0x3, 0x5, 0x5}, {0x4, 0x3, 0xffff, 0x6}, {0x93, 0x504, 0x0, 0x80}, {0x4, 0x0, 0x100, 0x1}, {0x747, 0x5, 0x9, 0x2d43}, {0x401, 0x7fff, 0x7fff, 0x7fff}, {0x2, 0x4e2f, 0x0, 0x5}, {0x7f, 0x358d, 0x80000001, 0x9}, {0x1, 0x5, 0x8, 0xfffffffc}, {0x2, 0x0, 0x5869, 0xffffffff}, {0x8, 0x6, 0x100000, 0x8}, {0x78, 0xf3, 0x8, 0x6a}, {0x3, 0xfff, 0x19}, {0x0, 0x0, 0x2, 0x2}, {0x0, 0x5, 0x5, 0x8}, {0xc2, 0x3, 0x7, 0xfffffff7}, {0x9, 0x0, 0x8}, {0x29e2, 0x80000000, 0x4, 0x4b2}, {0x4, 0x9, 0x80000001, 0x7}, {0x6, 0x1, 0xf2, 0x401}, {0x9156, 0xffffffff, 0x59, 0xe83}, {0x200, 0x10001, 0x8001, 0x7f}, {0xaae, 0x7, 0x5, 0x5}, {0x16f, 0x6, 0x3, 0x400000}, {0x0, 0x1, 0x1f, 0x10001}, {0x9, 0xffff, 0x2, 0x2}, {0x6, 0xeb3, 0xa, 0x401}, {0x1, 0x8001, 0x10000, 0x8}, {0x101, 0xb28, 0x8, 0x800}, {0x8, 0x4, 0x1, 0x9}, {0x1, 0x3010, 0xfffffbff, 0x6}, {0x6, 0xc3b, 0x0, 0x9}, {0x320, 0x531, 0x8, 0x1}, {0x1f, 0x7, 0x7ad, 0xff}, {0x8, 0x9, 0x3, 0xb35a}, {0x0, 0x6b77, 0x0, 0x1}, {0x5, 0x7ff, 0x80000, 0x8}, {0xd8, 0x5, 0x8000, 0x2}, {0x7fff, 0x0, 0x9, 0x81}, {0x361, 0x6, 0x8}, {0x81, 0xffffff80, 0x6, 0xad4e}, {0x5, 0x2, 0x401, 0x1}, {0x8001, 0x10000, 0xbe6, 0x8}, {0x1, 0x80, 0x2}, {0xd0, 0x1, 0xfffffffb, 0x1e5}, {0x80000001, 0x0, 0x2, 0x4}, {0x86bb, 0x2, 0x80, 0xbe}, {0xccd5, 0x100, 0x0, 0x1000}, {0x7f, 0x1ff, 0x7, 0x3}, {0x4f3, 0x7ff, 0x2, 0xffffff00}, {0x3f6d, 0x40, 0x2, 0x80000000}, {0xfff, 0x0, 0x8, 0x5}, {0x416, 0x1f, 0x68b, 0x800}, {0x0, 0x1000, 0xffffffff, 0x9}, {0xffff, 0x3, 0x4, 0x80}, {0x5, 0x7, 0x80000001, 0xc0}, {0x4, 0x4, 0xe7, 0x8001}, {0x15, 0x80, 0x24b7344e}, {0x10001, 0x7, 0x4afc, 0x40}, {0x0, 0x63, 0x1, 0x5}, {0x63a, 0x14, 0x100, 0x9}, {0x80010, 0xd1d, 0xbb, 0xfffffffe}, {0x0, 0x0, 0x4507a5e7}, {0x200, 0xe6a9, 0x2, 0x5}, {0xfff, 0x4, 0x80, 0x80000001}, {0x3, 0x8, 0x7314, 0x3}, {0x800, 0xfff, 0x8, 0xe5}, {0x200, 0x101, 0x100, 0xcd}, {0x8, 0x80, 0x10000, 0x1}, {0x8000, 0x9, 0x4, 0x1}, {0x7, 0x1, 0x40, 0x5}, {0x7, 0x5f, 0x5}, {0x9, 0x6, 0x400, 0xffff8001}, {0x8001, 0x4, 0x2, 0x2}, {0x5, 0x3, 0x5, 0x10001}, {0x80, 0x7, 0x4, 0x100}, {0x0, 0x9, 0x9d2c, 0x7f}, {0x3, 0x3, 0x8001, 0xf4e}, {0x8, 0x8, 0x1}, {0xff, 0x2, 0x1f, 0x80}, {0x9, 0x81, 0xe630, 0x7}, {0x1, 0x3, 0x80000001, 0x1}, {0x1, 0xa3, 0x4, 0x1f}, {0x2, 0x2, 0x3f, 0xd0}, {0x3, 0xffffffff, 0x0, 0x4f}, {0x1f, 0x1f, 0x9, 0x9}, {0x100, 0x4, 0x7}, {0x3, 0x3, 0x7, 0x2}, {0x0, 0x6, 0x0, 0x5}, {0x9, 0xfa00000, 0x7bd, 0x475}, {0x9, 0x988f, 0x6, 0x6}, {0x401, 0x6, 0xb35, 0x8}, {0x401, 0x0, 0x2, 0x2}, {0x1, 0xea, 0x5, 0x7}, {0x5, 0x2, 0xffffff52, 0xfc}, {0x6, 0x9, 0xffffffff, 0xc88}, {0x8, 0x7fff, 0x8001, 0x46e}, {0x2, 0x20, 0x6, 0x7}, {0x40, 0x19b, 0x2b, 0x20}, {0x401, 0x2, 0x1, 0x6}, {0x7fff, 0xffffff80, 0xfffffff9}, {0x4, 0xd47, 0x4, 0x51d}, {0x7, 0x1000, 0x2, 0xfffffffb}, {0x4, 0x7fff, 0x40, 0x10000}, {0x1, 0x0, 0x8, 0x80}, {0x0, 0x10000, 0x3}, {0x2, 0x1, 0xffffffff, 0x85c4}, {0x3443, 0xff, 0xfffffc00, 0x7}, {0x7, 0xbe2, 0x5, 0x1}, {0x7, 0x7, 0x7, 0xffff}, {0x80000000, 0xaf2e, 0x1, 0x1}, {0x3, 0x2, 0x100, 0x6}, {0x3, 0xd88, 0xbaf0, 0x54f}, {0x8ef, 0x81, 0xffb, 0x240}, {0x6, 0x0, 0x0, 0x1}, {0x1, 0x5, 0x1000}, {0xd8, 0x7ff, 0x5, 0x3}, {0x6, 0x2, 0x9, 0x8fb}, {0xad70, 0x6, 0x74, 0x5}, {0x2, 0x12, 0x7ff, 0xbba8}, {0x1, 0x5, 0x5, 0x2}, {0x7ff, 0x2, 0x3ff, 0x8}, {0xfffffffe, 0x40, 0xf2d, 0x6}, {0x4, 0x6, 0x3, 0x7ff}, {0x9, 0x7, 0x4, 0xad4f}, {0x80000001, 0x10001, 0xed, 0x39b7}, {0x1, 0x5eb03cc2, 0x40}, {0x7ff, 0x1, 0x800, 0x1}, {0x9, 0x0, 0x5, 0x7}, {0x8, 0x4, 0x4}, {0x8, 0x4, 0x0, 0x20}, {0x1, 0x401, 0x7}, {0x8d9, 0x0, 0xffff, 0x3}, {0xa5ea, 0x80000000, 0x0, 0xb41}, {0x6, 0x3, 0x0, 0x2}, {0x7f, 0x40}, {0x9, 0x8bb, 0x6, 0x80}, {0x0, 0x5, 0x5, 0x2}, {0x7fffffff, 0x7, 0x6, 0xee}, {0x71, 0x8000, 0x9, 0x3}, {0x3, 0x5, 0x6, 0x4}, {0x3, 0x401, 0x401, 0x5}, {0xffffff81, 0x7, 0x8, 0x2}, {0xfffffff7, 0x0, 0x3, 0x7}, {0x8000, 0x5, 0x6243edfd, 0xc}, {0xffffffff, 0x6, 0x40, 0xffff}, {0x3, 0x7, 0x6, 0xf627}, {0x6, 0xda, 0x1000, 0x401}, {0x4af, 0x0, 0x2, 0xfffffff7}, {0x8, 0x14477e52, 0x9, 0x8463}, {0x200, 0xff, 0x20, 0x81}, {0x101, 0x26d00000, 0x7fffffff}, {0xf3, 0x67, 0x2}, {0x6, 0x7, 0x7c1, 0xfffff406}, {0xfffffffa, 0x7ff, 0xff, 0x9}, {0x7, 0x1, 0xfffffff9, 0x3}, {0xfffffff9, 0xc00000, 0x8, 0x1}, {0x0, 0xcce7, 0x1ff, 0xc1}, {0x51, 0x9, 0xa63, 0x3f}, {0xd3, 0x200, 0x7, 0x101}, {0x200, 0x1, 0x8, 0x8001}, {0x0, 0xfffffffb, 0x20, 0x39c}, {0x1, 0x7, 0x1000, 0x82a}, {0x3, 0x5, 0x8, 0x8000}, {0x1, 0x7, 0xfffffffd, 0x20}, {0x9, 0x10001, 0x400, 0x2}, {0x6, 0x400, 0x30e, 0xffff}, {0x6, 0x2806, 0x1f, 0x6}, {0x4, 0x9, 0x6, 0x5}, {0x40, 0x0, 0x8, 0x7}, {0x80, 0x400, 0x7f, 0x4dab}, {0x40, 0x9, 0x9, 0xbb95}, {0x76d132dd, 0xffffffff, 0x400, 0xffff}, {0xffff0000, 0x5, 0x4661afbf, 0x3f}, {0x0, 0x100, 0x200, 0x1000}, {0x6, 0x4, 0x7, 0x6}, {0x8000, 0x1, 0x1, 0x10c}, {0x40000, 0x24ee, 0x7, 0x7}, {0x1, 0x9, 0x6, 0x1}, {0x7f, 0x8, 0x0, 0x9}, {0xffff, 0x3, 0x7f, 0x5}, {0x2bb, 0x1, 0x6ddf41e, 0x80000001}, {0x3, 0x5c, 0x9, 0x9}, {0x2, 0x0, 0x2, 0x6}, {0xf66, 0x0, 0xf547, 0x401}, {0xf13, 0x89, 0x81, 0xfffffff9}, {0x4, 0x10000, 0x0, 0x4}, {0x5, 0x20, 0x74e, 0x200}, {0x80, 0x2e, 0x1, 0x3ff}, {0x40, 0x33c, 0x3ff, 0xd1c}, {0x3, 0x20, 0xffff, 0x1ff}, {0x9, 0x2, 0x1, 0x10001}, {0x5, 0x1, 0x20, 0x55}, {0x4b8c, 0x3ff, 0x11, 0x7c0000}, {0x73ba, 0x5, 0x9, 0x10001}, {0x10001, 0x2, 0x7}, {0xfff, 0x4, 0x8000, 0x1}, {0x2, 0x0, 0x2, 0x5}, {0x5, 0x1, 0xd6}, {0x0, 0x5b7, 0x3, 0x7}, {0x7fff, 0x9, 0x5, 0x200}, {0x4, 0xffffffff, 0x80, 0x40}, {0x8, 0x9, 0x100, 0x6}, {0x1, 0x4, 0x0, 0xa0000000}, {0x826, 0x1ff, 0x8, 0x8}, {0x3, 0x142aa73e, 0x3ff, 0x6}, {0x6, 0x1, 0xf6e, 0x4}, {0x3ff, 0x4, 0x8, 0x4}, {0x6, 0x7e7, 0x9, 0xcc}, {0x7, 0x6, 0x0, 0x4}, {0x5, 0x5, 0x0, 0xffff469d}, {0xfff, 0x6, 0x1ff, 0x4}, {0x5, 0x0, 0x7, 0x1}, {0x3, 0x84, 0x1ff, 0x1fc0000}, {0x0, 0x0, 0x401, 0xefbb}, {0x9, 0x0, 0xff, 0x5}, {0x7, 0x6, 0x7000000, 0x5c}, {0x8001, 0x6, 0x8, 0x8}, {0x603, 0x1, 0x101, 0x6}, {0x0, 0x80000000, 0x6, 0x3}, {0x6, 0x8, 0x7, 0x1}, {0x7, 0xfffffffe, 0x4, 0x89}, {0x2, 0xa0fe, 0x9, 0x3}, {0xb8a2, 0x5a, 0x8, 0x6}, {0x9, 0x0, 0x4}, {0x6, 0x4}, {0x9, 0x3, 0x0, 0x3}, {0x9, 0x77a30c66, 0x1, 0x376cfe13}, {0x7, 0x1000, 0x20, 0xfff}, {0x9, 0x7c, 0x5, 0x7}, {0x3ff, 0x2, 0x200, 0x100}, {0x4, 0x3, 0x2, 0x5}, {0x10000, 0x20, 0x65, 0x3}, {0x3ff, 0x8, 0x0, 0xa000}, {0x9, 0x1, 0x2, 0x634}, {0x4, 0x3, 0x1ff, 0x7f}, {0x6, 0x4, 0xdc, 0x70}, {0x1, 0x101, 0x0, 0xffffffff}, {0x9d, 0xfff, 0x6, 0x8}, {0x4, 0x6e2, 0x4, 0xfffffffa}, {0xd7, 0x9, 0x1000}, {0x8, 0xa42a416b, 0x3ff, 0xfffffffe}, {0x2, 0x3f, 0x6, 0x800}, {0x8, 0x2, 0x3}, {0xc4, 0x2, 0x800, 0x40}, {0x1e, 0xf4b, 0x7, 0x802}, {0x77, 0x80000000, 0x9, 0x80000}, {0x53b3, 0x0, 0x9, 0x1}, {0x52, 0x9, 0x9, 0x3}, {0x6, 0x2, 0x5, 0xa63}, {0x9, 0x10001, 0x9, 0x9}, {0x8, 0xfffffc01, 0x8, 0x7}, {0x735, 0x7, 0xfff, 0x1}, {0xf058, 0x6, 0x5, 0x9}, {0xff, 0x1, 0x81, 0x1}, {0x10000, 0x6, 0x8, 0x101}, {0x5, 0x1, 0x2, 0x9}, {0x9, 0x6, 0x5fde, 0x8}, {0xfff, 0x3, 0x8, 0x6}, {0x3, 0xebc, 0x9, 0xb99c}, {0x7f, 0x2, 0x4, 0x7}, {0xfffffffc, 0xc7ea, 0x1, 0x15}, {0x3ff, 0xfffffff9, 0x0, 0x200}, {0x8, 0x8, 0x1, 0xfffffff9}, {0x5, 0x1, 0x5, 0x4}, {0x9, 0x5, 0x0, 0x3f}, {0x1, 0x0, 0xfa, 0x3f}, {0x1f, 0x7ff, 0x3ffc0000, 0x6c88}, {0x0, 0x5fef, 0x9, 0xa}, {0x10001, 0x4b3, 0x0, 0x7}, {0x96f, 0x3, 0x9, 0x3}, {0xa1a5, 0x1, 0x7, 0x2}, {0x8000, 0x2c, 0x10000, 0x7}, {0x0, 0x20, 0x8, 0xfff}, {0x4, 0x3f, 0x2, 0x9}, {0x0, 0x0, 0x8, 0x5}, {0x7ff, 0xff, 0x44, 0xde}, {0x294a, 0x7, 0x4, 0x6}, {0x1, 0x7, 0x5}, {0x1, 0x4, 0xffffffff, 0x565}, {0xffff, 0xeaff, 0x8c5, 0x1}, {0x3, 0x8000, 0x80, 0xb92}, {0x3, 0x5, 0x9, 0x5}, {0x802d, 0xffffffff, 0xffff, 0x4}, {0xffffffff, 0x3, 0xfffffe00, 0x2}, {0x0, 0x0, 0x8, 0x3f}, {0xfffffffa, 0x0, 0x2, 0x80000000}, {0x80, 0x1, 0x6, 0x6}, {0x40, 0x101, 0x10001, 0x1eb1}, {0x7fffffff, 0x2, 0x3f, 0x80000001}, {0x1, 0x0, 0x400, 0x1ff}, {0x3ef, 0x3, 0x80000000, 0xf5d7}, {0x2b4, 0x6, 0x80000001}, {0x7, 0x3, 0x10000, 0xff}, {0x80000000, 0x3, 0x1ff, 0x2}, {0x10000, 0xb2, 0x3f, 0xbfcf}, {0x4, 0x3, 0x8, 0x5}, {0x8, 0x0, 0x0, 0x8}, {0x7, 0x4, 0x3, 0xfffffffa}, {0x1, 0x0, 0x8676, 0x664}, {0x0, 0x6, 0x1, 0x33a}, {0x0, 0xfffffff8, 0x40, 0x4}, {0x89e, 0x2d, 0x8, 0x55a5}, {0x1, 0x2, 0x723, 0x8}, {0x7e73, 0x81, 0x9, 0x3}, {0x8, 0x7, 0x40, 0x80000000}, {0x7ff, 0x0, 0x6, 0x4}, {0x9, 0x4, 0x2, 0x2}, {0x5e, 0xfffffffb, 0x800, 0x7}, {0x8, 0xfffffff9, 0x6, 0x2}, {0x3, 0xfffffff9, 0x9, 0x8}, {0x1, 0x2f, 0x401, 0x800000}, {0x80000000, 0x15, 0x10000, 0x4}, {0x81, 0x3, 0x478f, 0x5}, {0xc0000000, 0x1, 0x2, 0x5}, {0x1, 0x1, 0x6, 0x189d}, {0x6, 0x9, 0xfe}, {0x706, 0xfff, 0xffff, 0x2}, {0x100, 0x2, 0xfffff800, 0x300000}, {0x2, 0x0, 0xce, 0xf8}, {0x4, 0xad, 0x3, 0x7}, {0xb1b3, 0x688d, 0x1, 0x54}, {0x8, 0x2, 0x6, 0x9}, {0x9, 0x7f, 0x2, 0x7ff}, {0x2, 0x10000, 0xfffffffa, 0x1ff}, {0x401, 0x3, 0x7}, {0x1, 0x9, 0x5, 0x8}, {0x9, 0x9, 0x7ff, 0x3ff}, {0x1, 0x1, 0xffffff4b, 0x3}, {0x1, 0xffff0000, 0x8, 0x1}, {0xfb, 0x100, 0xffffffff, 0xdd}, {0x5, 0x50ac, 0x400, 0x200}, {0x7f, 0x3, 0x8, 0x65}, {0x3ff, 0x200, 0x2, 0x3}, {0xffffffe1, 0x9, 0xc6, 0xfffffffd}, {0x7, 0x3, 0x6, 0x7}, {0x4, 0x383, 0xda93, 0xc7}, {0x8, 0x6f, 0xf45, 0x8}, {0x401, 0x2, 0xb9f, 0x6}, {0x51f, 0x800, 0x5, 0x3978a5f4}, {0x6, 0x1, 0x9}, {0xffffffff, 0x5f8, 0x4, 0x4}, {0x40, 0x9, 0x10001, 0x4}, {0x3f, 0xa99, 0x800, 0x1}, {0x25b2, 0x3, 0x101, 0x2}, {0x5, 0x4, 0xff, 0x9}, {0xfffffff8, 0x9, 0x5a0a, 0x6}, {0x7, 0xe57, 0x1, 0x20}, {0x2, 0x80000000, 0x3, 0xffffffe1}, {0x6, 0x1, 0x9, 0x268}, {0x2, 0x2, 0x2, 0xcdc}, {0x1, 0x80000000, 0xfffffffa, 0x7a}, {0x40, 0xffff7fff, 0xfffffff8, 0xffffffff}, {0x10000000, 0x1ff, 0x9, 0x80000001}, {0x3ff, 0xcd4, 0x7}, {0x3, 0xff, 0x8, 0x7ff}, {0x3ff, 0x7, 0xffffffff, 0x3ff}, {0x94, 0xb0, 0x80, 0x3b4}, {0x5, 0x3, 0x6}, {0x2, 0x0, 0x8000}, {0x5, 0x20, 0xba9, 0xfffffffe}, {0x10000, 0x8, 0x0, 0xffff}, {0x2, 0x3, 0x3, 0x4}, {0xffffffff, 0x8000, 0x6, 0x9}, {0x4, 0x6, 0x19, 0x1}, {0xfffffffd, 0x7, 0x2, 0x6}, {0x80000001, 0x3, 0x5, 0x1}, {0xfffffff8, 0x7, 0xc5, 0x9}, {0x8, 0x200, 0x8, 0x2}, {0x0, 0x3, 0x80000001, 0x6}, {0x400, 0x0, 0x3, 0x3}, {0x3, 0xc1f9, 0x5, 0xb42}, {0x4b34, 0x0, 0x200, 0xfffffff7}, {0xfffff800, 0xd8a, 0x8}, {0x5, 0x9, 0x1, 0x4}, {0xb19d, 0x2, 0x2, 0x4}, {0x7, 0x4, 0x8, 0x80000000}, {0x9, 0x7f, 0x80000000}, {0x2, 0x7, 0xfffffff9, 0xc7}, {0xffffffff, 0x7, 0x72a6, 0x4}, {0x6, 0x8, 0x7, 0x5}, {0x2, 0x0, 0x2}]}, 0x2689) 16:43:54 executing program 1: getresuid(0x0, 0x0, 0x0) geteuid() 16:43:54 executing program 0: syz_open_procfs$namespace(0x0, 0x0) 16:43:54 executing program 2: keyctl$reject(0x13, 0x0, 0x1, 0x80000000, 0xfffffffffffffffa) r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) keyctl$negate(0xd, r0, 0x1ff, 0xffffffffffffffff) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:54 executing program 3: socket(0x0, 0x80000, 0xd960) [ 569.311684][ T3488] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 569.318275][ T3488] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 569.355144][ T3488] vhci_hcd vhci_hcd.0: Device attached [ 569.372871][ T3492] vhci_hcd: connection closed [ 569.374253][T23704] vhci_hcd: stop threads [ 569.393802][T23704] vhci_hcd: release socket 16:43:54 executing program 0: syz_open_procfs$namespace(0x0, 0x0) 16:43:54 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x533802, 0x0, 0x10}, 0x18) renameat2(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2) getresuid(0x0, 0x0, 0x0) geteuid() getuid() 16:43:54 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f00000013c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000003400)={0x2020}, 0x2020) openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x10040, 0x101) [ 569.410807][T23704] vhci_hcd: disconnect device 16:43:54 executing program 2: getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) r3 = getuid() read$FUSE(0xffffffffffffffff, &(0x7f0000002380)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000006440)={0x638, 0x0, r2, [{{0x4, 0x1, 0x0, 0x4, 0x5, 0x2, {0x3, 0x3f, 0x1ff, 0xedb, 0x18c8, 0x248f, 0x7e, 0xff, 0x1f, 0xa000, 0x6, r3, r4, 0x40, 0x8}}, {0x1, 0x3, 0x0, 0xfff00000}}, {{0x1, 0x0, 0x800, 0x5, 0x10001, 0xffffffc1, {0x4, 0x8001, 0x3, 0x7, 0x9, 0x1580a492, 0xfff, 0xe1e6, 0x3, 0xa000, 0xf3, 0xee00, 0xffffffffffffffff, 0xb1e, 0x8}}, {0x3, 0x0, 0x0, 0x3}}, {{0x6, 0x2, 0x7fff, 0x5, 0x67, 0x6, {0x6, 0x9, 0x73d, 0x1, 0xffffffffffffffff, 0x0, 0x4, 0x5dac, 0x3, 0x4000, 0x0, r1, 0xee01, 0x7}}, {0x2, 0x8000, 0x0, 0xf0}}, {{0x7, 0x3, 0x1b8, 0x7fffffff, 0x101, 0x4, {0x2, 0x4, 0x2000000000000, 0x1, 0x55, 0x8, 0x1, 0x2, 0x2f, 0x6000, 0x7fffffff, 0xee00, 0xee00, 0x7fff, 0xd7d4}}, {0x6, 0x7fff, 0x1, 0xd601, '-'}}, {{0x1, 0x3, 0x6d, 0xffffffffffffffc1, 0x0, 0x3, {0x4, 0x7, 0x9, 0x4, 0x4fd6, 0x6, 0x7d14, 0x3, 0x40, 0x8000, 0x6, r5, 0xee01, 0x8, 0x1}}, {0x6, 0x6, 0x0, 0x2}}, {{0x1, 0x2, 0x1, 0x2, 0x20, 0x4, {0x6, 0xc7a, 0x9, 0x0, 0xab, 0x400040000000, 0x5ef, 0x9, 0x4, 0xc000, 0x2, r1, 0xffffffffffffffff, 0x10000, 0x5}}, {0x1, 0x9da9, 0x1, 0x1000, '$'}}, {{0x2, 0x3, 0xffffffff, 0x100000000, 0x3, 0x0, {0x4, 0x10001, 0x1543, 0x1, 0xfffffffffffffff8, 0x9, 0x1f, 0x5, 0x8, 0x7000, 0x10001, r1, 0xee00, 0x0, 0x3}}, {0x2, 0x7fff, 0x1, 0x4, '%'}}, {{0x1, 0x2, 0x0, 0x1, 0x81, 0x8, {0x3, 0x200, 0xea, 0x7, 0x8, 0x9, 0x4, 0x200, 0x59, 0x6000, 0xfffffffb, r0, r6, 0x0, 0x7fffffff}}, {0x3, 0x6, 0xa, 0xffffffff, '\x1a*:J@#%\x8b}\\'}}, {{0x6, 0x3, 0x1, 0x200, 0x6, 0x0, {0x3, 0x8, 0x1000, 0xffffffff, 0x1, 0x7d014d3c, 0x7, 0x1, 0x7, 0xb46ea50e4f5dedf2, 0x2, r1, 0xffffffffffffffff, 0x7, 0x3}}, {0x3, 0x6, 0x1, 0x0, '/'}}, {{0x3, 0x3, 0x3f, 0x0, 0x101, 0x210, {0x4, 0x2, 0x5, 0x3, 0xffff, 0x7, 0xc7, 0x9, 0x7, 0xc000, 0x0, 0x0, 0xffffffffffffffff, 0xffffffff, 0x101b}}, {0x6, 0xa370, 0x1, 0x4, '+'}}]}, 0x638) 16:43:54 executing program 3: socket(0x28, 0x0, 0xd960) 16:43:54 executing program 4: syz_open_procfs$namespace(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), 0x4) 16:43:54 executing program 0: syz_open_procfs$namespace(0x0, 0x0) 16:43:54 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x130) r1 = getuid() read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002340)=ANY=[@ANYBLOB="90020000feffffff", @ANYRES64=0x0, @ANYBLOB="06000000000000000000000000000000000000000000000002000000000000002c88000000020000020000000000000025480000000000000600000000000000200000000000000000020000000000001e04000000000000ffffff7fa70200000600000000800000fcffffff", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="18a10000bcbafa23000000000000000000000000040000000000000002000000060000002d460000000000000100000000000000020000000000000004000000000000000900000000000000010100003f89d157020000000000000000000000000000000300000000000000100b0000000000006e00000000000000000100000000000004000000060000000900000000a0000007cd897d", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="010400000300000000000000060000000000000005000000000000000000000004000000010000000000000003000000000000000080000100000000070000000000000008000000f9000000ffaf6562d28b5096251dc58e246457ffffffffff0000000000000000000001000000000000000080000000000900000000000000030000009500", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="ff00000008000000000000000000000000000000c6b974450000000009000000010000002f26245d23242e2c2100000000000000060000000000000003000000000000000600000000c19564f33501ca5188eb9f542a000000010000800000000001000080d8000000010000000000000001000080000000d252987f000200000000000000090000000000000003000000000000000600000000000000a6510000070000", @ANYRES32=0xee01, @ANYRES32, @ANYBLOB="02000000e0ffffff000000000200000000000000050000000000000001000000feffffff2340000000000000"], 0x290) 16:43:54 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f00000013c0)={0x2020}, 0x2020) openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x10040, 0x101) 16:43:54 executing program 3: socket(0x28, 0x0, 0x0) 16:43:54 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x200) 16:43:54 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000080), 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x9b0fd224999b0e95, 0x2) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000000c0)) getuid() getresuid(&(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000180)) 16:43:54 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x533802, 0x0, 0x10}, 0x18) renameat2(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2) getresuid(0x0, 0x0, 0x0) geteuid() getuid() 16:43:54 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x10040, 0x101) 16:43:54 executing program 3: socket(0x28, 0x0, 0x0) 16:43:54 executing program 1: getresuid(0x0, 0x0, 0x0) getuid() ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000000)=0xcb) 16:43:54 executing program 4: r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, 0x0) 16:43:54 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x533802, 0x0, 0x10}, 0x18) renameat2(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2) getresuid(0x0, 0x0, 0x0) geteuid() getuid() 16:43:54 executing program 5: openat$incfs(0xffffffffffffff9c, 0x0, 0x10040, 0x101) 16:43:54 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd4, 0x0, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "2029ce33e4c12a52e4041349e68266d19d445245f1d87a98cc"}}, @TIPC_NLA_NODE_ID={0x75, 0x3, "b3306dc09f83c461355673cfd9ec2c0a04c94831aa517db41f770af857a688eefdf0784d166f951a025bc6bcb8f4654de6aa28df3f6de004532096d1418fb82c13c6d98a48d0b49a8aa461ec51882172ec816c4654d5d7d9f82c4214c9a08d4e98c9efd6821a0c7bbf230a6a387f46bf3a"}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x13}, 0x4000) getresuid(&(0x7f0000000040), &(0x7f0000000000), 0x0) 16:43:55 executing program 3: socket(0x28, 0x0, 0x0) 16:43:55 executing program 1: getresuid(0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000040)='rxrpc\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x10000) r0 = add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="82c3d7cc723b5b4a837e047313b7529c934d2c6c53b268db554897bcbf4b467169c081c04a7d016ad9ae07d71836258f770b751557c6cb8378e7fc01bd139d55e40ff1c89d0aabc55d5c2cd8", 0x4c, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="1a17268e5cd4b22f70be3aa6ee50c9ac782fa16df460d05356b7ee146872558dd6572854d04aaf7228", 0x29, 0xfffffffffffffff9) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x1) 16:43:55 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x533802, 0x0, 0x10}, 0x18) renameat2(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2) getresuid(0x0, 0x0, 0x0) geteuid() getuid() 16:43:55 executing program 4: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/75, 0x4b}, {&(0x7f0000000100)=""/87, 0x57}, {&(0x7f0000000180)=""/16, 0x10}], 0x3, &(0x7f0000000200)=""/252, 0xfc}, 0x100a0) 16:43:55 executing program 5: openat$incfs(0xffffffffffffff9c, 0x0, 0x10040, 0x101) 16:43:55 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000001c0)={r0, 0x26, 0x8f}, &(0x7f0000000200)={'enc=', 'raw', ' hash=', {'blake2s-256\x00'}}, &(0x7f0000000280)="51ef09e7cd7a8ef27583191e7a279c9e9d15948820d0753ec72f82e9334009a1b46145e1f0ec", &(0x7f00000002c0)=""/143) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000140)='./file0\x00', 0x4, 0x10400, 0x12345}, 0x0) 16:43:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x200) 16:43:55 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x533802, 0x0, 0x10}, 0x18) renameat2(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2) getresuid(0x0, 0x0, 0x0) geteuid() 16:43:55 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x6, 0xfffffff9, 0xd90, 0x2, 0x1, 0xffff0000, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4}, 0x40) r1 = inotify_init1(0x80000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd=r0, 0x9, {0x0, r1}, 0x9, 0xc}, 0x9) 16:43:55 executing program 5: openat$incfs(0xffffffffffffff9c, 0x0, 0x10040, 0x101) 16:43:55 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000280)='.pending_reads\x00', 0x4801, 0x2) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)=0x8000, 0x4) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/cgroup\x00') r4 = openat$incfs(r0, &(0x7f00000001c0)='.pending_reads\x00', 0xc0800, 0x100) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240), 0x8) bind$pptp(r4, &(0x7f0000000200)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012dbd7000fddbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="08000900000000000800020000000000060006000200000006000600040000000800080001000000"], 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x20000000) 16:43:55 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) 16:43:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x200) 16:43:55 executing program 1: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000240)) r4 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg(r4, &(0x7f0000000580)={&(0x7f0000000380)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/49, 0x31}], 0x2, &(0x7f0000000500)=""/109, 0x6d}, 0x100) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x2, 0x1, 0x9, 0x101, 0x1000]}, &(0x7f0000000340)=0xe) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000040)) 16:43:55 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x533802, 0x0, 0x10}, 0x18) renameat2(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2) getresuid(0x0, 0x0, 0x0) 16:43:55 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x0, 0x101) 16:43:55 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x3, 0x240) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)={0x18}) syz_open_procfs$namespace(0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x14, 0x0, &(0x7f0000000100)=[@exit_looper, @request_death={0x400c630e, 0x1}], 0x62, 0x0, &(0x7f0000000140)="907bd4fc38d8272fec42994d6c16ff1e1ec2e56788d40298d78ece46079347c7ad72348e1f6facfc35e803855265be5aed0ee9293f01c4a81959555a28c18f2f3657b9866e9b9bfcb045100631db639b675c2be6b6c928e8c228940c5a5a193de330"}) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f00000000c0)=0x1, 0x4) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) connect$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x0, @private=0xa010100}}, 0x1e) r3 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x448d00) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x2288, &(0x7f0000000240)) 16:43:55 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x7, 0x0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x86c4, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x10, 0x7fffffff}, &(0x7f0000000300)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r0, 0x4) ioctl$SNDRV_PCM_IOCTL_INFO(0xffffffffffffffff, 0x81204101, &(0x7f0000000100)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000480), 0x8, 0x400) ioctl$SNDRV_PCM_IOCTL_XRUN(r1, 0x4148, 0x0) 16:43:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x200) 16:43:55 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x533802, 0x0, 0x10}, 0x18) renameat2(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2) 16:43:55 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x0, 0x101) 16:43:55 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@GTPA_I_TEI={0x8}, @GTPA_LINK={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x401}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_NET_NS_FD={0x8, 0x7, r1}, @GTPA_LINK={0x8, 0x1, r2}, @GTPA_NET_NS_FD={0x8, 0x7, r3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x40d0) 16:43:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x200) 16:43:55 executing program 2: r0 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000100)=0x14, 0x140000) accept4$packet(r0, &(0x7f00000059c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005a00)=0x14, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000005ac0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000005a80)={&(0x7f0000005a40)={0x30, 0x0, 0x621, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x8040}, 0xc000) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:43:55 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x0, 0x101) 16:43:56 executing program 1: getresuid(0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0}, 0x2020) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004840)={&(0x7f0000004440)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000047c0)=[{&(0x7f00000044c0)=""/130, 0x82}, {&(0x7f0000004580)=""/196, 0xc4}, {&(0x7f0000004680)=""/128, 0x80}, {&(0x7f0000004700)=""/133, 0x85}], 0x4, &(0x7f0000004800)=""/34, 0x22}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f00000049c0)={&(0x7f0000004400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000004980)={&(0x7f0000004880)={0xe0, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x80}, 0x41) read$FUSE(0xffffffffffffffff, &(0x7f0000002040)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getgid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004080)={0x320, 0x0, 0x0, [{{0x6, 0x0, 0x5, 0x100000001, 0x7, 0xfffff6d9, {0x1, 0x6, 0x8, 0x89b7, 0x6, 0x3, 0x9, 0xfffff000, 0xfe, 0xa000, 0x6, r0, 0xffffffffffffffff, 0xffffffff, 0x80000001}}, {0x4, 0x1dbc00000000000, 0x1, 0x4, '-'}}, {{0x1, 0x1, 0x0, 0x2, 0x13bf, 0x5, {0x1, 0x9, 0x1, 0x6, 0xfffffffffffffff7, 0x2000200000000, 0x7, 0x1f, 0x6, 0x4000, 0x0, 0x0, 0x0, 0x20}}, {0x5, 0xf20, 0x0, 0x7}}, {{0x0, 0x2, 0x7a, 0x7, 0x74b90b3, 0x200, {0x5, 0x5e7cc10e, 0x7ff, 0x5, 0x0, 0x1, 0x3f, 0x8, 0x10001, 0xc000, 0x1, 0xee00, 0xee01, 0x0, 0x400}}, {0x1, 0x4, 0x0, 0x8}}, {{0x3, 0x3, 0x2, 0x23, 0x9, 0x8, {0x6, 0x1, 0xffffffff, 0x7, 0x4, 0xe8c5, 0xffffffff, 0x4, 0x20, 0x2000, 0x4, 0xee00, 0xffffffffffffffff, 0xfffffc01, 0x1}}, {0x0, 0x59a, 0x7, 0x6, '+&]\x85\\@\xf9'}}, {{0x3, 0x2, 0x9, 0x1, 0x6, 0x1, {0x1, 0x3, 0x2, 0xfffffffffffffffd, 0x201f3ab9, 0x7, 0x22, 0x1, 0x1, 0x4000, 0x2, r2, r3, 0x52, 0x6}}, {0x4, 0x224, 0x2, 0xffff8000, '-]'}}]}, 0x320) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000043c0)={0x7}, 0x8) 16:43:56 executing program 0: openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x533802, 0x0, 0x10}, 0x18) 16:43:56 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000001340)='.log\x00', 0x10040, 0x0) 16:43:56 executing program 4: syz_open_procfs$namespace(0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(0xffffffffffffffff, 0x4148, 0x0) 16:43:56 executing program 2: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x200000d, 0x810, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f00000004c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x80000000, &(0x7f0000000440)=[{&(0x7f00000000c0)="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", 0xff}, {&(0x7f00000001c0)="36f57db01ca6a422561ff0a3fa06f879444856547f534ac69b1fa214624a754fc91355aeb66e8e298560b3d8b49cbe60e9ff91bded8bd8c6541020c4c126f72caa33185ec6479eebc46472", 0x4b}, {&(0x7f0000000000)="8c22d78971fe55c55112af0d96f564966cc2", 0x12}, {&(0x7f0000000240)="ade4e2ed7a23081aa33b", 0xa}, {&(0x7f0000000280)="4e1e3c1feb114f9f74a52c878d262356c62c3ad50870bdd935e47ce36c9018c8c8d169dfce98cf90c82dbfec8056d4247ee2a963eb0fb11d47c158708b77fb0758d3d257d269c6d22621565897dd1fd9b6a36e5170e747cab6b09baadc39de740bbaa0997e642303234942743ab11da3a3db5931d7779998bea3be347075f412a5738278d31029b54fa7b6656ee9c02790e32030ad0068771b248bd323ca8394cb95", 0xa2}, {&(0x7f0000000340)="bffdf57985d7541cc8e5d3396c08d4e98d9c162ed2bdafa729fc2a9f652c58a6901373e10a0389c330feadaa07e9aff423a3b927db0316945f79ebfa3b31a9e53ca77e7446a6380cf6d304a541c6d1a209acf44708b4d2425eb6ac82b63d34c3e1f5bb62b19e68877fcaac52121f385cdfd2f7445a5ee76cd9594a8acbef0ed4ee2f2ade5a67017c614975a6e9185a08c17a0644cdbe0bf19fb7842c66c3f8cdcf65", 0xa2}, {&(0x7f0000000400)="60206398280b4aa6c3c1d84e238ab9b996e4039cf26db9f43076c7e4bbc69f861dbdaa27956dc50626ba085afb34191b1b8dd23b60e0", 0x36}], 0x7, 0x4, 0x1}, 0x101) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) syz_open_dev$dri(&(0x7f0000000500), 0x0, 0x303000) 16:43:56 executing program 3: faccessat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x200) 16:43:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r0, 0xc0245720, &(0x7f0000000000)) 16:43:56 executing program 3: faccessat2(0xffffffffffffffff, 0x0, 0x2, 0x200) 16:43:56 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x533802, 0x0, 0x10}, 0x18) 16:43:56 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) getuid() 16:43:56 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000240)) r4 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg(r4, &(0x7f0000000580)={&(0x7f0000000380)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/49, 0x31}], 0x2, &(0x7f0000000500)=""/109, 0x6d}, 0x100) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x2, 0x1, 0x9, 0x101, 0x1000]}, &(0x7f0000000340)=0xe) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000040)) 16:43:56 executing program 1: getresuid(0x0, 0x0, 0x0) getuid() 16:43:56 executing program 3: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x200) 16:43:56 executing program 2: getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f0000008640)) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) r3 = getuid() read$FUSE(0xffffffffffffffff, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000006180), &(0x7f00000061c0)) read$FUSE(0xffffffffffffffff, &(0x7f0000006200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000008240)={0x3c8, 0xfffffffffffffff5, r2, [{{0x5, 0x0, 0xe6, 0x2, 0xd3a, 0x400, {0x6, 0x81, 0x7ff, 0x1ff, 0xffff, 0x3, 0x9, 0x593f, 0xa6b8, 0x4000, 0x8, r3, 0xee00, 0x2, 0xec}}, {0x3, 0x80, 0x2, 0x101, '.\x00'}}, {{0x5, 0x0, 0x9, 0xff, 0x4, 0x9, {0x3, 0x4, 0x200, 0x9, 0x23d62b71, 0x17, 0x3f, 0x7, 0x0, 0xd927bca6831f453a, 0x80000000, r0, r4, 0x4a8c, 0x800}}, {0x2, 0xe00000000, 0x7, 0xfff, '![:\\@,['}}, {{0x4, 0x0, 0x34ae, 0xfffffffffffffffa, 0x7, 0x5, {0x2, 0x80000000, 0x5, 0x0, 0x2, 0xffffffff, 0x2, 0x4, 0x3, 0x1000, 0x3ae6, r1, r5, 0x4, 0x80000001}}, {0x0, 0x7, 0x0, 0x5}}, {{0x2, 0x3, 0x1f, 0x400, 0x1, 0x470, {0x4, 0x3, 0x2, 0xc4d1, 0x9493, 0xffffffff, 0x1e79e643, 0x8000, 0x6, 0xc000, 0x8, r6, 0xffffffffffffffff, 0x97, 0x800}}, {0x5, 0x45a, 0x2, 0x7ff, '}-'}}, {{0x0, 0x3, 0xba, 0x7ff, 0x2, 0x401, {0x5, 0x8, 0x6, 0x6, 0x8, 0x100, 0x9, 0xff, 0x7f, 0xc000, 0x5, r0, r7, 0xc}}, {0x3, 0x4, 0x1, 0x10000, '#'}}, {{0x6, 0x1, 0x200, 0x5, 0x0, 0x28, {0x2, 0x8, 0x925f, 0x101, 0xe2, 0x100000000, 0x7ff, 0x0, 0xfffffff9, 0x1000, 0x6ee5, r0, 0xee00, 0x200, 0x7}}, {0x5, 0x80ce, 0x7, 0x8, '-$$]..!'}}]}, 0x3c8) 16:43:56 executing program 4: r0 = syz_open_procfs$namespace(0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000180)=[{}, {}, {}], 0x3, 0x20, &(0x7f0000000040)={[0x62]}, 0x8) r1 = epoll_create1(0x80000) r2 = openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.pending_reads\x00', 0x10b900, 0x144) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000140)={0x0, 0x6, 0x0, &(0x7f0000000100)=0x3ff}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0xa0000000}) 16:43:56 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:43:56 executing program 1: getresuid(0x0, 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x8a6e) geteuid() getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 16:43:56 executing program 3: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:43:57 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:43:57 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) geteuid() r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000001700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b00)=0x14, 0x80000) accept4$packet(0xffffffffffffffff, &(0x7f0000001f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001fc0)=0x14, 0x800) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000003780)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000003740)={&(0x7f00000037c0)={0x16fc, r0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x38, 0x5, "8e9a5804b847307e5321e7d464f2a7d6f3ed1cf6d8e2e498f788502a2744e911fcb68c5db4b0d34094b04922ce3902be60549d9d"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x64, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5e, 0x4, "5a1de593df53777ca28c325b24a48f794cc8afc6327fe9b096d4a7652ce12db2d466a80f6f33be7adafd238ab8aa18c1f4782577905242fadc9f0a8adda98aff3968e35cc081b6661be51a392e8d198b3701291f7f1e15c5f8b0"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x13e8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xec, 0x3, 0x0, 0x1, [{0x4}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xadd7}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xf4\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ')[-&\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, ')\\,}.](\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '/^\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':}]%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '-/{^#+\x00'}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3256}, @ETHTOOL_A_BITSET_BITS={0xd4, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '%.$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa44e}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '$!#\xd3+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_BITS={0xec, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb927}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x211}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '{.\'/\x00'}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5b8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'-\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '-(-,\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\x91+$//\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '+\xec%#\x06#\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xe4, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '/[!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '.)/--.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\'\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x8, 0x5, "2dab4a00"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "55e3f22227b4abfa7fb0600a8d24611a69530396965c504e18fd645b8815165c274eac5259715abd5b6e1fd6c61d9678d3f2e0512ff90d96121b0bc676130902c22d76ce0f336086c806a90a480778067b3621ba1d7829f35fecddb907c4a39f56d66f83ed6aa523d00957e76800d57d8ecdd00ce83795d55cd41b9ad560402e8124c4172e0f655e7f00ce07d648275b342df9db66fb49e14ac2cbeee04a6502aa5ba8ee9f059df866c14d2b628b7cfe35d04bb656708c3b955e43fd59d25e7a487ad989d3eab9f2aba08dcc03b7e8f6061a48d20d08963cc34ea07f08a81363aa371ec4eadfc90b008d82d20cbda72becabfa0ea4d4bc8da72647e5972d381d723632ab4e616e7fc7eca1afda3ff0ae72e661fd4e3f17e58808bb25543f57dc8c6440f62b7a14ddd3e6fb6ad0e2a282d8a54e9dc1602d2d4c24d818b2bbb09230ef7ee8fc285834e70ed505368a8bb865076356879e29a73420721838187d3e4580c0aca3c3913458a99d7b0aa1a299578bd878a9bde0ecee69a18d8dac8ee46f4912062c23c41ddcaba448b7ab602b3d0a7dff23c48333248674d9fb846d551d143e616ea7df7112b8df5f685b67224f23c5379603ca94c217139100a885e2e7f2d182ff5f7e2ad5d8cc5a0acc904b5e03f48dfef38de4559a666996e2833e62204e50fa9e96f2fabc5832cb165f4452c322304820f89792cde47adba49bb78a1fbda75e93369f23209f286c7e66b29812d052d3a05b66105aa76ad94fc210c74d88be2e88f7988a5926a85d16f2276595d0c506d042bc0610ee4c0b11c98219bb78a63fdb0c343271951f9fb7e95bdc317208417e1a4c1a0ca65c180d84e19c582a8a0b3399a958942aff3d9a33e79149175708f411aa31bc04259021fdc9e704de31ea037a3b5a0e4067ab232462d74f9a42ff3abad638e7711a5bc1ae2358b4d88d32844b4c39cd90bde0748ae98c3ecf5bd9979a3f5ef072e6230bfbbdf8bea6b3a13b279a9e19fe7c92d62614afb7ffbaba9434dbfff173a2bb4bfa1170221b239d63510ce423a23cb1be3eb76c5bfbb44c447fe0b5c6aa397c3018099ffab1c135e5185e59dff9460657a2d088d6d61317ebcfccfd671df8facaf8ae2c719ca43d8d9207069d27aa22c145c92b102096c6c5c5bae62bd82e5071799c5f8459baa5d0db434989e3fb0ab23db62d14ca1d7afc68b45b7a562d4cd7d45c920fdcc06aaffee138bcbc809c09bbf7c8fd5579ca221922b113b97e3f9476bf4cd23f42d11dd2e4902c27d40733a3d56f36a1a0911731c7603327f2235bb654515537976b586ea2e40deca7a5e77a142abb0b602b5b2c7f6dace5c8d55eb2cf694dea731f6bcbf3e8fb6b7c88c5a45249d1374f71812715033fa78b2821bb955dc2bd2cde7fb11186a3392b4d1b77381ced213fe72197759259fd9ec01e135bccaabd695c2bb6929994251294e453672c653247c5ff7ada766c71f9ef8c3a8ac35a59d5739615a4a4cac228c48b1656b220ff9a97ca71e8a16d06bd8da600a7e979611b345db7c0773f5da344afb5cb6081b4a2da9e676d102e04be9fa66ac7d5ebbb29b0b19b8cd5faa2c2abb3896c6e6361b061c6160e3cdf2795d05f1a834450bc8401c1bba47bd8bb169432bcdb541c97461214dad8f57f7932e6d1b5bd91e8dce17b9e4c6438f553c6aa0cb69285c45e781585a489ae8b6a05b429c9166c55461693c505841497ab23620845441880a4f3683115fdb0ec20fc9e858f8c5627022252ecbd822343a652af4d8492e5f805bd669855eaf9f8be95ecfb3fd0ecf57a54c4336dd1432216dd124b08a0999b069601f76b14820c7a491e8fa14b26d218d383ec9a18f474e804cf15a0ea41c3151369a8711495186c7d74bf9d8679ce439cfde8d6560c43aab77ccb5d6c03e42ead60b43e6c862178d9d45db955c61143e988f2fcc04d09740a164177f29eabffd3147f7d99f3f2f39d8da461b6de0a079e3df3cd1dab638a4a571528459465e68349c67ca2cf53060c870ecf1b5faed63d16ee572461d87a83e52387e3d15c0557dde353a8de8f22a09d7e6849a26285c9281367dd456b0c070f70209114c2ce1039ace7b698ce16ebb7d9c8911658c376113a16a62ad7c1282f415bffc2f8c7943a84b31db54b36c9ae65a2d6e81c8f7015d53a3af8e6a0637d660f698bf855a6b0f0b2da7d29ebec3bc51a72ee840f2501ccea5310ee89030fc3e2ea1d5e228a55aa029e579b0011258babfdadffeff3921bbaf8b7cf43ba99ebf7b9739b0e2bbd945e69b009e16bd690262a16c04e8bd91646d800ac340dbe27c5e5baf85909e903cc732dbf02639751cc3a4df781726929242263b51bb828a3fb14d7dda59e68afdc6e8ab22117f057bd11bff5801ae00187f3e12cf64bbc3dd92f9d1451b1db7d5c6752659719294feb5ccf8d85b608797028a28152ce5327ebd7ac0312e68f3e22a3bd6d00dc6629f465e1d046d0d2f450628e54e5ab1d73b41dadae9ed68beb120b26a30aa8f9e5ffece79fd9423386e8ec130811e0d665f8289a4695a4f6ba5ee9c563ec548d467d7bbed20ee86bb575c772284c4ef4800933f39278775617c99a4030ea27899f5039121f807476132d26e1feedb05fa91d90f5b3bc558ce806b3f075642fb5d8bbe3aeeeefd25e2b65a28bc7e6f4b6df30c0c61d574f82442bc9e47bf6529d5f73ecb8d3cbdcf5831bc1e715c3d279373b0dfe620bea1bdb3eba3ad0328f77c52974e31b7aa2873f06e8b234699de34ec4c1f6eda2e1cf1e6e0d155a06cba976929f41e0fed9a3d83eaa71c670ad5ba1428908ce6099368612631b961edf72b4decae2b3a24fda5c5bcd0647b758f28e6f88cbc75490974f9620b695616db9ec8f14cc84ebb4c4e20f74e4a027efcb80c9d048ecf6b726862ec77c35a9af5f3fae9a8b200fbdb85d97a454d16afbc5add7913d8de24895536b0e9589130427bd121f8bb60989b16cbdf47202591a69e49e1331d9b4baf92a31e37118c89b15027f05ad8423d22ac623fe9a90d9e296c44247db04949fc31106e3cb77b322b9d1511e44d542591c6d973bb76d7f05167f4a904ada5d2187f821735ce827e95d2435e80ded559e06d5d3f6897e8acb7b6e7e9d0ff1463737e6a8b6f194a0402d0978db8245797bf816f66fba4967c4f26e5b4d979ae9e7dc704b6b69732a07fe27dc8f818941cac35aa87618374e46836dc9b5a887520bffb7cbe67f285fa7b0afa02e7d4ce235911e43784cade01eaa921b2c281d35c732204a61da7bba513fb6dd985ecea2fe3096afd148ce03fcd74b165a9e9d079ffcda00551155aed025b913b962845db53de6b5fa627a343178dcdabfce2a8c9474c478e3977daa52ff68d185b20a1ce741e11644ec82f99e000e2a1a4c43291a8d89b0e86186e5662813400019eaed005439d9790c18c5a8a3c30444b1bc4d9970e608d86ca19508a466b85dafca4fd334b41e03714a9886927bb42a9bca43e1870c89c46ceead3fa336522d8bffc4a5639d88347dd88856205ec93ff8da95fcc023dfdbebb09c0424655b13206377df6bf83133812d46a33e3a35daf18c745ca50114e3474bc7c60cace2acd0222ad94a059f7d1be9c642f57471971c202db253002c58d253788a943c325d0c26f7d9a071cbbb284a2916f28140e566bf67d88542facb6766ae76b1b516f90e40ede2fb57a7079cc9ada05f9442de81b614f404d4066c90c4e7ee1d07f1a643badf517783395c84be6c76d2c8391971a8c1436e6fa99379953259ddafa9b53b5b00e177242e04bacc81ab1400a57d8efc338253c0476e021f1ced65b5e390fbbb45fe062eda7bdbc5bbfeec4279ea37638548fe65978f1c39e6ae88128062afbf9c6da8aa0b235545d04404e57e2e32209e87b7698154ab30fa4227717d0e143a33b169585f96496ab6b2846ff6a5ee7e85fed78c6b8e1ca916a4c7742342c7472b7a3279f89e61d11742348b49f29e175a62bff3bb9011bb2af34c6e4ff4dc959b25c84a6fe6a23a186af8ef8acaf7f60ed449ebdd342f5252283ece11c16fa8892a332eb91302b6ad31e47a6bbf81604bec99c63e2730fc705d5000c2bf2b64eba512484c531971e29180393319c378811272c1e513d83f10ac2daf6197e714a7f2da1d41f1617d9109a5f309475343fafcbb7779405a699da66428b90701ebb2706809bbaae9365194c93f74b1bb8850bac37e1272f88517bb66bdc82cf5534bc62a14a9831216d8e7bdb32ccca5d9d929f758936daa3babf95744e698191f20f2c090e28d6d71d89d052cb62fca61d4a4987230cb38de725b193ccca5703d52b9b2f690ddd8b530a81f7c9fbf0c0a29b287bc3e648d0f11ba7987b8d5f162bdbe00482739699a114a5215ad47ce72915c49a7265a973f3f3dd05403aa2d6fd679cc7b1f5f6275f5916273a8024ee3042f2c4811005ec97cb9ddc6273be2ac3996f239445910f63f66d2c197dee058163fa53ea01fa691fb76ceb3964040ba5221833d7c0d5d0155022d6d95c8574fed2c34d4e9a9570ff442bfbbed18884025f654637f16090809fd3aa7063abe16e0b7446f764b6ed0246e9cbbe5b86b9adac73dfcdb963165fbea84a0d73ad4b697b936d3a72318456fb59666696828a6bb514e255d4e392be6c0f9fdc274954ca274b207ffe4ac895e3e53e8bcb2ea1060dad272ed0b91f4dc5f9e93270309f585501f4a86ad17be64b9bba0df4e7ea978d15c92df93aa5d5316a0f7b6eaf58fea7427819cd36a63dc39bbcf23c1820123fbb4a83d6fc54ef2c3acc6f9f129b36dad0638093b08781abd0586b6704a795e37a925e673d2750cb14427b8c6533d0ef98aadca56153bea8cd421b574737c7dde8a15254359bffcf466587d8e364e8e9b0d6172ab5fb02a94d03e2f0470e17a205aeee8eb600441d8bc2a7b6e78d32dbfbd938aaf137a6659fdfd66319eaabcf2ff90c28fbc5062a5a7cfd4a931edac4c88220fb3d64111289ae537bf4e7ca971d777c409a1a94e15a9a0adbcab23a376c9c865b8b7d6d24be8b305c46047bc0b7e6eb2e81bfe1e287dc899783a3aca2359e4e5e591a9af431c66bf1c5755bcaf65c9cd98c3efa6216ce86c842858d3702aefff8ace5657ab5b8790cf0a1682aa050a0e09444301e26572ffee2356a5bb6de474764d38a90b00786c6a2f7b6c20a39715e2f139213a39a445c27a732ce5f3e7897482e4308539fcfca92810fb0f41b2e733f127853ca1816884e605d8c685b06fbd8298fccd486a03abfd0cc85b172dc0d42154418c0779417de87511a7696cee46b5dcbe1f9ee4655d1ab26a1ff802ec9ba653e0381b95db468ab5ea6231a0b06821b7c731583e0f1563830f308a052f6db52c433e962fad8f0e3ca9dd46c0211c1995eb0dd196b835fdd119f7da48df6fc0c0d30df2efedc3da40ff017af4b920b9406cbae36280051214010720347b164a8d9334e3f4a093d3ee0ef2830cece6de33a43c88d650952ae3a92295883d38b5b51650a81dfc251cac8a35b204efbb93a38154ca2224e9fe8431782e5af0056a2a97479e277c7660b4cb8c6a2a442da155f2dcda19f3c46cf3458877d37b34d1d6fad17defe7f23912852291de855197cd60410cc543ea850a008c6fc31f350b745ba893425c2c5e6bbace942169c94c3c124613bde98cf746acbacc4fdfc0bcc18e024657aab89a29acf4cdc25802d790dfb559d00a4fc20893747757e40a281dab2d8ad5cc4664f21f1c91fcb08f1ddfc0147dc5341e"}, @ETHTOOL_A_BITSET_MASK={0x32, 0x5, "ac81215a6ea8374c0531092a90d78a65f8f3e92619d10a59218c6e9633fe923c8375711be6148ab80cb2f2bf618a"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xe8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_MASK={0x1a, 0x5, "8e8f2c484ddc3692fbb8cd5a72eafb40f50f8800fe03"}, @ETHTOOL_A_BITSET_VALUE={0xbb, 0x4, "09a364ed0bb9b2cbfe1c649a5e23c8a88a5c134081ae1a6db4ae5d43d3cb1c64305538c3071c47775fc4479d1b1c3f636f78765d4a8a298155590dbff208bbbd8a2d9fe7ca9498b0c6b30bb467412bc66e70e33a6d6db4805c2100ac8ba8cb8b5e65aa045a026e764cea588064ff242ba0a256c462a5ed47c7ff4301d3c89539eea7b4f649295ccd8137c254f1549bce1925e71466a224eaf3988d81ca532c4e364a52d1d2e35e6cc88ebf431c938130c570ba75625edf"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xa8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x9, 0x5, "9eb2100f0a"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x84, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '-{S$\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffff}]}]}, 0x16fc}, 0x1, 0x0, 0x0, 0x404cc84}, 0x40000) clock_gettime(0x3, &(0x7f0000000000)) 16:43:57 executing program 4: syz_open_procfs$namespace(0x0, 0x0) clock_gettime(0x6, &(0x7f0000000040)={0x0, 0x0}) futimesat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r0, r1/1000+10000}, {0x0, 0xea60}}) 16:43:57 executing program 1: getresuid(0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index=0x9, 0x400, 0x0, 0x7, 0x5}, 0x9ff) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000004140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getresuid(&(0x7f0000006180), &(0x7f00000061c0), &(0x7f0000006200)=0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000006240)={0x468, 0xfffffffffffffffe, 0x0, [{{0x5, 0x2, 0x6, 0x0, 0x8000, 0x8, {0x4, 0x7, 0x2, 0x2, 0x6, 0x6, 0x80, 0xffffffff, 0x1b9d3b0b, 0x1000, 0x0, 0xee00, r0, 0x0, 0x1d}}, {0x0, 0x1d, 0x4, 0x7, '&[$,'}}, {{0x6, 0x2, 0x2, 0xfffffffffffeffff, 0x1, 0xfffffffc, {0x0, 0x80000001, 0xc8f, 0x25a, 0xffffffffffffffb6, 0xc3, 0x0, 0x7ec6, 0x0, 0x1000, 0x4, 0xee01, r1, 0x0, 0xd8}}, {0x0, 0x2}}, {{0x3, 0x1, 0x100000000, 0x800, 0x5132, 0x10001, {0x3, 0x8, 0xffff, 0x401, 0x10000, 0xffff, 0x5, 0x5, 0x2, 0x5000, 0xc5, r2, r3, 0x7, 0x6}}, {0x5, 0x9, 0x3, 0x81, '/-@'}}, {{0x2, 0x1, 0x99, 0xff, 0x40, 0x51b, {0x4, 0x400, 0x75, 0x0, 0x2, 0xc9f, 0x7, 0x0, 0x7, 0xc000, 0x2, 0xee01, 0xee01, 0x6, 0x6}}, {0x5, 0x100000000, 0x1, 0x101, '('}}, {{0x2, 0x2, 0x1000, 0x9, 0x80000000, 0x2, {0x5, 0x3, 0x800, 0x8000, 0x101, 0x2, 0xc00, 0x10000, 0xffffff00, 0xa000, 0xffff, 0xee00, 0xee00, 0x81, 0x1}}, {0x0, 0x6, 0x1, 0x5, '\x00'}}, {{0x4, 0x3, 0x10001, 0x80000001, 0x1, 0x3, {0x6, 0x9, 0x7ff, 0x4e71, 0xe11, 0x7fff, 0x7eb, 0x100, 0x2, 0xbccf052e8f2286d, 0x127, 0xee00, 0xee01, 0xffffffff, 0x6}}, {0x5, 0x7fff, 0x1, 0x9, '\x00'}}, {{0x1, 0x1, 0x1, 0x10001, 0x4, 0x8, {0x4, 0xffffffff, 0x3f, 0x5, 0x100000001, 0x0, 0x800, 0x8d, 0x1, 0x1000, 0x28e, r4, 0xee00, 0x0, 0x80000000}}, {0x5, 0x5, 0x1, 0x4, '\x00'}}]}, 0x468) 16:43:57 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000240)) r4 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg(r4, &(0x7f0000000580)={&(0x7f0000000380)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/49, 0x31}], 0x2, &(0x7f0000000500)=""/109, 0x6d}, 0x100) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x2, 0x1, 0x9, 0x101, 0x1000]}, &(0x7f0000000340)=0xe) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000040)) 16:43:57 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:43:57 executing program 3: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:43:57 executing program 2: getresuid(&(0x7f0000000080), &(0x7f0000000000), 0x0) 16:43:57 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x882, 0x8) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x8a100, 0x105) r3 = socket$can_j1939(0x1d, 0x2, 0x7) accept4$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x800) connect$can_j1939(r3, &(0x7f0000000280)={0x1d, r4, 0x1, {0x1, 0xff, 0x3}, 0x2}, 0x18) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', 0x300, 0x101) faccessat2(r2, &(0x7f00000000c0)='./file0/../file0\x00', 0x157, 0x1200) 16:43:57 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0x1) getresuid(0x0, 0x0, 0x0) 16:43:57 executing program 3: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:43:57 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0]}) socket(0x22, 0x800, 0x1f) 16:43:57 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x10}, 0x18) 16:43:57 executing program 4: ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) syz_open_procfs$namespace(0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2044081}, 0x40) 16:43:57 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = io_uring_setup(0x1460, &(0x7f0000000000)={0x0, 0x6e3a, 0x10, 0x0, 0x2e8}) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x2}) getresuid(0x0, 0x0, 0x0) 16:43:57 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0x1) getresuid(0x0, 0x0, 0x0) 16:43:58 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000240)) r4 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg(r4, &(0x7f0000000580)={&(0x7f0000000380)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/49, 0x31}], 0x2, &(0x7f0000000500)=""/109, 0x6d}, 0x100) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x2, 0x1, 0x9, 0x101, 0x1000]}, &(0x7f0000000340)=0xe) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000040)) 16:43:58 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x18) 16:43:58 executing program 4: syz_open_dev$binderN(&(0x7f0000002040), 0x0, 0x800) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) getpgrp(r0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 16:43:58 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000002100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000002140)={r0, 0xa6, 0x99}, &(0x7f0000002180)=ANY=[@ANYBLOB="656e0d29cb68f5862dd7bb63e97430e5633d6f616570206861736800006861920c69ad3232340000000000000000000000000000000000fdfb890282d0622200"/88], &(0x7f0000002200)="779350e4f6a69d7fef47546602b47bb54a75c1bd37716f57ddb4bc36befcba6fc3d35c50340a605139daa9e58887816957b6bdbf1fa508ce6f79e8e42adb5e9dc51c22bb5ff5296260abc095dca17a4d477af8a4fe3718637baee640bd57efe467e56da9652d20ef43324a2565f32ea6b6f501e3a17a96954677b8ff336df55a7c23bde913173b21a3bde1e4e8fdc32249adaae572831fe1adbc2041290f63a5054c4194916d", &(0x7f00000022c0)=""/153) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) 16:43:58 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x7fffffff, &(0x7f0000000000)=""/5) read$FUSE(0xffffffffffffffff, &(0x7f0000002080)={0x2020}, 0x2020) getpgrp(r0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) setpriority(0x0, r1, 0x81) 16:43:58 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0x1) getresuid(0x0, 0x0, 0x0) 16:43:58 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000000)={r0, 0xc6, 0x1000}, &(0x7f0000000040)={'enc=', 'oaep', ' hash=', {'tgr128-generic\x00'}}, &(0x7f00000000c0)="d299b78fbb5005ee419b060b56cd37342372e8755dc513b488e947a8be96071c451574f40425ac205b68ad1905ac465a9c93e325303c8906909e384d9d9f9ff1811d30d6f2eb7e31641654c643cbeedad44b585d4f98aba184267d25ab09bc95d8899483bdda7265a143207bca864d597ae748866faf5c3ca4f9e6651012f2475e6eebd3775356b9a934fe85fc56abe163e37ca610ab244998a61a6ed9d0904563dd36c6c48fba090c149fa97e7698cfa1aa92c155e24ae3365c8c9632036c6d13e77e1cc768", &(0x7f00000001c0)="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") 16:43:58 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000000c0), 0x4) getresuid(0x0, 0x0, 0x0) 16:43:58 executing program 2: syz_usbip_server_init(0x5) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) geteuid() setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) r3 = getuid() read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r6, 0x6b, 0x3, 0x0, 0x0) r7 = syz_io_uring_setup(0x4b75, &(0x7f00000045c0)={0x0, 0x2c8c, 0x8, 0x1, 0x8, 0x0, r2}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000004640)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000004680)={0x9}) r8 = getgid() r9 = getuid() r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) write$FUSE_DIRENTPLUS(r10, &(0x7f00000046c0)={0x470, 0xfffffffffffffffe, 0x0, [{{0x2, 0x1, 0xffff, 0x7, 0xa1, 0x8, {0x1, 0x7, 0xffffffffffffffe1, 0x8, 0xc36, 0xff, 0x9, 0x4, 0x3, 0x6000, 0x100, r3, 0xee00, 0x7, 0xcf}}, {0x6, 0xd45, 0x6, 0x648a, '-{%]]^'}}, {{0x6, 0x3, 0x100, 0x4, 0x1ff, 0x1f, {0x0, 0x2, 0x470, 0xfffffffffffffffc, 0xb3, 0x1000, 0x4, 0x45, 0x6, 0x8000, 0x2, r4, 0xffffffffffffffff, 0x80, 0x1}}, {0x0, 0x81, 0x6, 0x800, '^#)*\':'}}, {{0x0, 0x3, 0x66, 0xea, 0x7f, 0x40000000, {0x4, 0x7, 0x1, 0xff, 0x1fc000000000, 0x0, 0x401, 0xac, 0x9, 0xa000, 0x9, r0, 0x0, 0x4, 0x1}}, {0x0, 0x3ff, 0x2, 0x7, '!,'}}, {{0x3, 0x2, 0x81, 0x8, 0x101, 0x4, {0x0, 0x8, 0x1, 0x7, 0x0, 0x4, 0x6, 0x5, 0x7b86, 0xc000, 0x3, r5, r8, 0x3f, 0x9}}, {0x0, 0x5, 0x2, 0x8001, '}&'}}, {{0x1, 0x1, 0x2, 0xe7a, 0x53, 0x962, {0x5, 0x400, 0x6028, 0x80, 0x3, 0x3, 0x44, 0x7, 0x6e, 0x1000, 0x0, r1, 0x0, 0x6, 0x1aa22a07}}, {0x6, 0xec1, 0x8, 0x8, '*&P-6!:/'}}, {{0x1, 0x3, 0x80000000, 0xf7, 0xfffffffe, 0x7, {0x3, 0x9, 0x20, 0x9, 0x2, 0x9, 0xd4, 0x8, 0x200, 0x0, 0xffffff00, r9, 0xffffffffffffffff, 0x7, 0x80000000}}, {0x3, 0x29, 0x2, 0x7ff, '$&'}}, {{0x0, 0x3, 0x4, 0x1, 0x20, 0x4, {0x3, 0x200, 0x5, 0x100000000, 0x3, 0x3, 0x7fff, 0x7, 0x80000000, 0x4000, 0x80000000, r0, 0xee01, 0xfffffff7, 0x6}}, {0x2, 0xffffffff, 0x5, 0x7f, '}:!\xc6%'}}]}, 0x470) 16:43:58 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x18) 16:43:58 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0x1) getresuid(0x0, 0x0, 0x0) 16:43:58 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ieee802154, &(0x7f00000000c0)=0x80) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, r1, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010100}, @GTPA_O_TEI={0x8, 0x9, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast1}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_I_TEI={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3b}}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x7fb5941b8f5d5df6) r2 = userfaultfd(0x0) accept4$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14, 0x0) accept$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) accept4$packet(r0, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000019c0)=0x14, 0x800) accept4$packet(r0, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001d80)=0x14, 0x800) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000002080)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000002040)={&(0x7f0000001dc0)={0x270, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x270}, 0x1, 0x0, 0x0, 0x4880}, 0x4001) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x3000, 0x1}) [ 573.868720][ T3746] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 573.875303][ T3746] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 573.927789][ T3746] vhci_hcd vhci_hcd.0: Device attached [ 573.955600][ T3748] vhci_hcd: connection closed [ 573.960487][ T1611] vhci_hcd: stop threads [ 573.969651][ T1611] vhci_hcd: release socket [ 573.979093][ T3752] uffd: Set unprivileged_userfaultfd sysctl knob to 1 if kernel faults must be handled without obtaining CAP_SYS_PTRACE capability [ 573.985059][ T1611] vhci_hcd: disconnect device 16:43:59 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000240)) r4 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg(r4, &(0x7f0000000580)={&(0x7f0000000380)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/49, 0x31}], 0x2, &(0x7f0000000500)=""/109, 0x6d}, 0x100) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x2, 0x1, 0x9, 0x101, 0x1000]}, &(0x7f0000000340)=0xe) 16:43:59 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x18) 16:43:59 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0x1) 16:43:59 executing program 1: getresuid(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f00000001c0)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000240)=""/71, 0x47}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/140, 0x8c}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/134, 0x86}], 0x6, &(0x7f0000001600)=""/130, 0x82}, 0x101) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:43:59 executing program 2: getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002100)={0x150, 0x0, r2, [{{0x6, 0x3, 0x7ff, 0x5, 0x0, 0x1, {0x0, 0xce5, 0x5, 0x5, 0x73, 0x8cfbca8, 0x9, 0xce9b, 0x3, 0xa000, 0x36, r0, 0x0, 0x4}}, {0x2, 0x3, 0x1, 0x9, '!'}}, {{0x6, 0x3, 0x2, 0x9, 0x3, 0xffffffff, {0x2, 0x40, 0x9, 0x3, 0x9, 0x5, 0xb3, 0x9, 0x1, 0x6000, 0x3, r1, 0xee01, 0x3, 0x5}}, {0x4, 0x8, 0x1, 0x20, '\\'}}]}, 0x150) 16:43:59 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000000)=[@clear_death={0x400c630f, 0x2}, @increfs_done={0x40106308, 0x3}, @acquire_done, @free_buffer={0x40086303, r1}], 0x3c, 0x0, &(0x7f0000000080)="c5097618cc0cd174d4779a0ab922493706800ceed95e592a6654e5e3442497b0b5601eabf37e361754482d27b046f7f5bafae1b6a5815b3d845477c4"}) r2 = socket(0x1f, 0x3, 0xffffffff) bind$can_j1939(r2, &(0x7f0000000580)={0x1d, 0x0, 0x2, {0x2, 0x0, 0x2}, 0xfd}, 0x18) 16:43:59 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) 16:43:59 executing program 1: getresuid(0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x4, 0x2000, @fd, 0x4, 0x0, 0x0, 0x1, 0x0, {0x1}}, 0x80) 16:43:59 executing program 0: getresuid(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f00000001c0)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000240)=""/71, 0x47}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/140, 0x8c}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/134, 0x86}], 0x6, &(0x7f0000001600)=""/130, 0x82}, 0x101) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:43:59 executing program 2: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002, 0x8010, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f00000000c0)=@IORING_OP_FILES_UPDATE={0x14, 0x4, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], 0x8}, 0x80000000) r3 = getpgrp(0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r3, 0x7, r2, &(0x7f0000000140)={r4, r5, 0x5}) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f0000000100)) 16:43:59 executing program 4: getgid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x5, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x5}, 0x0, 0x0, &(0x7f0000000080)={0x3, 0xe, 0x40, 0x1000}, &(0x7f00000000c0)=0x20, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x3ff}}, 0x10) 16:43:59 executing program 1: getresuid(0x0, 0x0, 0x0) syz_io_uring_setup(0x188d, &(0x7f0000000680)={0x0, 0x1345, 0x0, 0x0, 0x256}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000700), &(0x7f0000000740)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000780)=@IORING_OP_FSYNC={0x3, 0x5, 0x0, @fd_index}, 0x6) syz_io_uring_setup(0x29c9, &(0x7f0000000000)={0x0, 0xff18, 0x2, 0x3, 0x17e}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000640)='.log\x00', 0x88401, 0x44) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff0000/0xe000)=nil, 0xe000, 0x1, 0x11, r2, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000600)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)=@caif=@rfm, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/88, 0x58}, {&(0x7f0000000280)=""/24, 0x18}, {&(0x7f00000002c0)=""/178, 0xb2}, {&(0x7f0000000380)=""/135, 0x87}, {&(0x7f0000000440)=""/119, 0x77}, {&(0x7f00000004c0)=""/4, 0x4}], 0x7, &(0x7f0000000580)=""/60, 0x3c}, 0x0, 0x40012042, 0x1, {0x1}}, 0x2) 16:44:00 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000240)) r4 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg(r4, &(0x7f0000000580)={&(0x7f0000000380)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/49, 0x31}], 0x2, &(0x7f0000000500)=""/109, 0x6d}, 0x100) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) 16:44:00 executing program 0: getresuid(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f00000001c0)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000240)=""/71, 0x47}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/140, 0x8c}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/134, 0x86}], 0x6, &(0x7f0000001600)=""/130, 0x82}, 0x101) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:00 executing program 3: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) 16:44:00 executing program 4: r0 = getpgrp(0x0) getpgrp(r0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r1, 0x0) 16:44:00 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) geteuid() syz_usb_connect(0x1, 0x85, &(0x7f00000000c0)={{0x12, 0x1, 0x300, 0x43, 0xba, 0x1a, 0x8, 0x5c6, 0x9076, 0xd48b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x73, 0x1, 0xc9, 0x3, 0x80, 0x2, [{{0x9, 0x4, 0x5, 0x6, 0x3, 0x6d, 0x9c, 0x70, 0x8, [@uac_control={{0xa, 0x24, 0x1, 0x8, 0x8e}, [@selector_unit={0x6, 0x24, 0x5, 0x5, 0x40, "89"}, @feature_unit={0x11, 0x24, 0x6, 0x3, 0x1, 0x5, [0x4, 0x8, 0x5, 0x2, 0x4], 0x6}, @selector_unit={0xa, 0x24, 0x5, 0x3, 0x9, "59863fd200"}, @feature_unit={0xb, 0x24, 0x6, 0x2, 0x5, 0x2, [0x7, 0x0], 0x35}, @selector_unit={0xa, 0x24, 0x5, 0x6, 0x9, "f657cb3db8"}]}, @uac_as], [{{0x9, 0x5, 0xe, 0x10, 0x40, 0x9, 0xf9, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x100, 0x81, 0x401}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0xfc, 0x3f}}, {{0x9, 0x5, 0x80, 0x10, 0x0, 0x6, 0x7f}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000000)={0xa, 0x6, 0x200, 0x3, 0x1, 0x20, 0x40, 0x1}, 0x5, &(0x7f0000000180)={0x5, 0xf, 0x5}, 0x6, [{0xdd, &(0x7f00000001c0)=@string={0xdd, 0x3, "c07ad84bd7cf7a8cc5540fc3976b84e403727c095b470eeb99db7aa313cfd242f1e84f7d9b627261c2b8e68997d8decf4ff88b08548c6ad1b14c6544dda45929d5ca3eab303c1776da9035a1cf221b554a6a7d1dccc04fecba99dfe7842b9adae43f24c5802e228be3f73a72fbca284eddae461b360c32cf6785d75a7827ec639b1e6574514d12bb523b127a6f64762fe2fb711538adeb02ce0b1f882dede95c09ff32bb9ee09f0e4d4ed4a7cd5e464e38742db5a969ef346d5a0e83f89c7646f477c976a7a1f4d90e669e4d4ce5a6648c63e4a0106b30909d437e"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x3801}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x40c}}, {0x35, &(0x7f0000000340)=ANY=[@ANYBLOB="3503fcfa79413785d9f5ac6d9272963971d455e4f50af7bcb20ac3211b582c33c3a385008f3048c3f0dba5fb6cf41bf7689dcf048d"]}, {0xa5, &(0x7f0000000380)=@string={0xa5, 0x3, "f6981b334d0b1e6e4722c6f1ebe7e49afb5b600b09cabbbfdf3b5cb897ecb318bd0e2bad827ccf3046c9a2e2054ae98fa58706d56b5677df8e137de9490c311173d9b998027f1fb7b893cbd9a2cf9bc3b4ec4ba84f5998014ade716293d6dfc1ccbda81ede9eca31e0b8faec980909bc39218c04be2523f62afd8937e974c33a93ab2f89b81cfbcfd1a71672f0bbf8b10f89489451d5b1d709c3b6128bf0ae6de33602"}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0x405}}]}) getuid() getuid() 16:44:00 executing program 1: syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x80, 0x0, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, 0x0) 16:44:00 executing program 0: getresuid(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f00000001c0)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000240)=""/71, 0x47}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/140, 0x8c}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/134, 0x86}], 0x6, &(0x7f0000001600)=""/130, 0x82}, 0x101) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:00 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_NET_NS_FD={0x8, 0x7, r1}, @GTPA_FLOW={0x6, 0x6, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x84}, 0x4004) 16:44:00 executing program 1: accept$packet(0xffffffffffffffff, &(0x7f0000007540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007580)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000007680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000007640)={&(0x7f00000075c0)={0x68, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_FEATURES_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x10048000) getresuid(0x0, 0x0, 0x0) 16:44:00 executing program 3: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) 16:44:00 executing program 3: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) 16:44:00 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@ax25={{0x3, @bcast}, [@default, @bcast, @netrom, @default, @null, @bcast, @remote, @bcast]}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/141, 0x8d}], 0x1, &(0x7f0000000180)=""/194, 0xc2}, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/77, 0x4d}], 0x1}, 0x10000) [ 575.743232][T31830] usb 3-1: new low-speed USB device number 2 using dummy_hcd [ 576.140262][T31830] usb 3-1: No LPM exit latency info found, disabling LPM. [ 576.251746][T31830] usb 3-1: config 201 has an invalid interface number: 5 but max is 0 [ 576.260299][T31830] usb 3-1: config 201 contains an unexpected descriptor of type 0x2, skipping [ 576.269574][T31830] usb 3-1: config 201 has an invalid descriptor of length 0, skipping remainder of the config [ 576.283116][T31830] usb 3-1: config 201 has no interface number 0 [ 576.291358][T31830] usb 3-1: config 201 interface 5 altsetting 6 endpoint 0x5 has invalid maxpacket 393, setting to 8 16:44:01 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000240)) r4 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg(r4, &(0x7f0000000580)={&(0x7f0000000380)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/49, 0x31}], 0x2, &(0x7f0000000500)=""/109, 0x6d}, 0x100) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) 16:44:01 executing program 4: syz_open_procfs$namespace(0x0, 0x0) 16:44:01 executing program 0: getresuid(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f00000001c0)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000240)=""/71, 0x47}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/140, 0x8c}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/134, 0x86}], 0x6, &(0x7f0000001600)=""/130, 0x82}, 0x101) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:01 executing program 1: getresuid(0x0, 0x0, 0x0) syz_io_uring_setup(0x3310, &(0x7f0000000000)={0x0, 0x7081, 0x8, 0x3, 0x240}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000440)=@IORING_OP_READV=@pass_iovec={0x1, 0x4, 0x2007, @fd, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/36, 0x24}, {&(0x7f0000000140)=""/101, 0x65}, {&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/57, 0x39}, {&(0x7f0000000240)=""/36, 0x24}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/206, 0xce}], 0x7, 0x2}, 0x101) [ 576.303721][T31830] usb 3-1: config 201 interface 5 altsetting 6 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 576.318694][T31830] usb 3-1: config 201 interface 5 has no altsetting 0 [ 576.542858][T31830] usb 3-1: New USB device found, idVendor=05c6, idProduct=9076, bcdDevice=d4.8b [ 576.561986][T31830] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 576.577743][T31830] usb 3-1: Product: Ќ [ 576.586207][T31830] usb 3-1: Manufacturer: 㠁 [ 576.598035][T31830] usb 3-1: SerialNumber: 﫼䅹蔷涬犒㦖푱૵볷લ⇃堛㌬ꏃ…わ썈ﮥ鵨ӏ 16:44:01 executing program 2: getresuid(&(0x7f0000000080), &(0x7f0000000000), 0x0) getresuid(&(0x7f0000002100), &(0x7f0000002140), &(0x7f0000002180)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) setsockopt$SO_J1939_PROMISC(0xffffffffffffffff, 0x6b, 0x2, &(0x7f0000002280)=0x1, 0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) epoll_pwait(r1, &(0x7f00000021c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0xff, &(0x7f0000002240)={[0x1]}, 0x8) 16:44:01 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) 16:44:01 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 16:44:01 executing program 0: getresuid(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f00000001c0)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000240)=""/71, 0x47}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/140, 0x8c}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/134, 0x86}], 0x6, &(0x7f0000001600)=""/130, 0x82}, 0x101) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:01 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getresuid(&(0x7f00000040c0), &(0x7f0000004100)=0x0, &(0x7f0000004140)) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) r5 = geteuid() r6 = getgid() r7 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000006200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$incfs(0xffffffffffffff9c, &(0x7f0000004080)='.pending_reads\x00', 0xd040, 0x10) inotify_add_watch(r9, &(0x7f00000061c0)='./file0\x00', 0x0) r10 = getgid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000008240)={0x508, 0x0, r1, [{{0x6, 0x0, 0xd28, 0x400, 0x2, 0xe3, {0x3, 0x5, 0x3, 0x8, 0x7, 0xcd, 0x8000, 0xb4ca242, 0x4eca, 0x2000, 0x5, r0, r2, 0x4, 0xff}}, {0x1, 0x324c, 0x3, 0x6, ',$-'}}, {{0x0, 0x3, 0x0, 0x8, 0x2, 0x2, {0x1, 0xffff, 0x0, 0x1, 0x1, 0x3, 0x8, 0xfffffffb, 0x9, 0xa000, 0xd84, r3, r4, 0x3e, 0xfffffffd}}, {0x3, 0x1, 0x7, 0x8, '\'})@\xb6\':'}}, {{0x0, 0x2, 0xfffffffffffffffa, 0x6, 0x7ff, 0x2, {0x1, 0xf8, 0x20, 0x979b, 0x1, 0x1, 0x4, 0x7edf7ab5, 0x5, 0x2000, 0x1d3c, r5, r6, 0x2, 0x3}}, {0x4, 0x7ff, 0x2, 0x401, '\x13$'}}, {{0x0, 0x1, 0x1, 0x9, 0x9a, 0x2, {0x2, 0x400, 0x1, 0xc0b3, 0x401, 0x3, 0x6c2, 0x9, 0xffffffff, 0x2000, 0x10001, r7, 0xee01, 0x3ff, 0x40cc}}, {0x2, 0xffff, 0x3, 0x4, ')\\{'}}, {{0x4, 0x1, 0x4, 0x200, 0xffffffff, 0x40, {0x0, 0x1000, 0xadd, 0x5, 0x0, 0xd7, 0x20, 0x3, 0xffffffff, 0x8000, 0x80000000, r8, 0x0, 0x1}}, {0x2, 0x1, 0x9, 0x7ff, '^/&*\\([B+'}}, {{0x5, 0x0, 0x0, 0xffff, 0x1, 0x8, {0x4, 0xfffffffffffff000, 0x2, 0x401, 0x800, 0xfffffffffffffd8b, 0x9, 0x0, 0x7fff, 0xc000, 0x3, r0, 0xffffffffffffffff, 0x4, 0x6}}, {0x0, 0x800, 0x0, 0x3}}, {{0x6, 0x0, 0x57, 0x5, 0x1, 0x200, {0x0, 0x7, 0x7, 0x10001, 0x7, 0x3, 0x9, 0x0, 0x1, 0x4000, 0x2, 0xee00, 0xee00, 0x37, 0x5}}, {0x1, 0x80, 0x4, 0xf39, '*.-&'}}, {{0x0, 0x1, 0x1, 0x4, 0x6, 0x5, {0x6, 0x9, 0x8, 0x3, 0x20, 0xffffffffffffff01, 0x5, 0x8000, 0x7, 0x8000, 0x0, r0, r10, 0x3, 0x4}}, {0x5, 0x341, 0x0, 0x6}}]}, 0x508) [ 576.998117][T31830] usb 3-1: USB disconnect, device number 2 16:44:02 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) 16:44:02 executing program 4: syz_open_procfs$namespace(0x0, 0x0) getgid() 16:44:02 executing program 0: getresuid(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f00000001c0)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000240)=""/71, 0x47}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/140, 0x8c}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/134, 0x86}], 0x6, &(0x7f0000001600)=""/130, 0x82}, 0x101) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:02 executing program 1: getresuid(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0xfffffbff, 0x7f, 0x3f, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002cc0)={&(0x7f0000002b00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000002b80)=""/89, 0x59}, {&(0x7f0000002c00)=""/48, 0x30}], 0x2, &(0x7f0000002c80)=""/15, 0xf}, 0x2040) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x80800) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000002dc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002d80)={&(0x7f0000002d00)={0x64, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PAUSE_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x81}, 0x24000880) 16:44:02 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000240)) r4 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg(r4, &(0x7f0000000580)={&(0x7f0000000380)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/49, 0x31}], 0x2, &(0x7f0000000500)=""/109, 0x6d}, 0x100) 16:44:02 executing program 0: getresuid(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:02 executing program 2: getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002840)={&(0x7f0000002800)='./file0\x00'}, 0x10) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)=0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) openat$fuse(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002180)={0x290, 0x0, 0x0, [{{0x3, 0x2, 0x7ff, 0x9, 0x9, 0x7ff0000, {0x6, 0x7, 0x6, 0xb0e9, 0x0, 0xe6, 0xfff, 0x2, 0x5, 0x6000, 0xffffff4c, r3, 0xffffffffffffffff, 0x2, 0x34ac}}, {0x6, 0x2, 0x1, 0x692, '!'}}, {{0x1, 0x0, 0xf8c7, 0x8, 0x47, 0xfffffffb, {0x2, 0x8, 0x0, 0x0, 0x1, 0x4, 0x7ff, 0x3, 0x7fff, 0x1000, 0x7a, r1, 0xee00, 0x100, 0x7fffffff}}, {0x5, 0x10000, 0x3, 0x100, ',\'^'}}, {{0x3, 0x0, 0x2, 0x1010000000, 0x0, 0x5, {0x4, 0x1, 0x9, 0xfffffffffffffbc8, 0x913a, 0x7f, 0x5, 0x7fff, 0x3, 0x6000, 0x0, r0, r4, 0x800, 0xffe}}, {0x5, 0x0, 0x9, 0x3, '/#}!\']}5('}}, {{0x5, 0x0, 0x65, 0x8485, 0xfffffe00, 0xc72, {0x2, 0xffff, 0x9, 0x8, 0x4, 0xffffffffffffffff, 0x6, 0x1f, 0x9, 0x2000, 0x10001, r1, 0x0, 0xf15d, 0x7}}, {0x2, 0xe0000000000, 0x0, 0x7ff}}]}, 0x290) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000024c0), r2) sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f00000027c0)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002780)={&(0x7f0000002500)={0x260, r6, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x18, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xde0}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1068}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7b002d1f}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xa4}]}, @TIPC_NLA_MEDIA={0x50, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_NODE={0x178, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "505884c5d45ee0a1ae897247e802877e535a859b03cbc97c2eff1c5fb659a8e9c8"}}, @TIPC_NLA_NODE_ID={0xb3, 0x3, "8a8b30ce563d9ae91329754345cc40cf04c04ade41842baf2f3cb7fc998a35abd576e7fce208a0401981d2438d9d597ec8016de01010cccf6842488b139585f8f554ea3df92d9461b6385f16bf8bb6ef830aa8e97f434b541dda9099ce19e95efca62fa2665ba9b820d0bdde19166b4c2a5b86c6ec168cd8e32039818ea5fff3fba999e991b271528b1d5820cdeb54f8d4b5667b655e3888e4549a0893ad1c263ca1e464ad67702fafd15863cd1bdd"}, @TIPC_NLA_NODE_ID={0x2f, 0x3, "79174f3c203dfdae3eb2a9e0fdf71077c5af697e74dfca1af5d573af7b624c32b6606832d24b9980ea3c89"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "122cea614a8923298462eea741bf7c3dfc297e58"}}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x260}, 0x1, 0x0, 0x0, 0x4000810}, 0x3) 16:44:02 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e", 0x1f}, 0x48, 0xfffffffffffffffc) 16:44:02 executing program 4: syz_io_uring_setup(0x5bd, &(0x7f0000000000)={0x0, 0xdd, 0x2, 0x3, 0x1f0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_open_procfs$namespace(0x0, 0x0) 16:44:02 executing program 1: getresuid(0x0, 0x0, 0x0) getuid() r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000000), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000001040)={0x4, 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="dc9da4a11a864cc0d189b75d3e4b3784de4c376bf4df44fda7ee0a5bf7a43cf8f1b673ae68b2bd42dba31792a9fdfbe56ea7ffb91359374bbb7d8c27ffa0b7931a87ecc4ff4b3915e65a40b9a1bd8b6b71ea9eb284b541ab50fb24aec75b65feb02dc5c4eb283a4b1aa738d3f273ccabd72311beffeb6e9b69e4f268e142a3d904836cd950f6f225ade0f3a4e85a866167815d7d78e5f2206f7504"], 0x1000, 0x0, &(0x7f0000000040)="142c28f4798596af00b94d5a260a4682aa365eeb80bd332952f470b2cf3f403d4755483f4ba1f7406322f2c6b57f42cba45b81b2d06497e23c320f1d2695068248bd81cd406d8bba67438d3f23d2b8867d48a51ab58f25188ec5cb749a587def5caab9aaa2a3de719762bbf2b6ba267a091a97ee42631386253fd25ade369326cde72d9c9c6dec162df0ed0a26ba39b021dd193b675d8067ea4189c11545fd7e59cd1781ecc37213e87c43ae89cf8e58b03c6b068d083d09f40c74c7869868e9801bcce9792ba08c5775f57539e8a7c4deff8539ecd2a2055b3c0b3edb6946006350bef618ab5234e097ae7b3828f355adcb05b102bb8c5318f51ec06325331ce22d0eab747d975f5b78ee9cf355f08d3e324bd96600bfbc9ac314363c1272964c05d3d047038df3146260df1bd42b7dae67d82d0336d5da83c9cce2a79e8a7b805e3af63c7ee04156a43243a20ac114310d84868cb3d1e6b17344f8caa2341c8fb23abc6c5af7143392d24bcc7fdbb95a4d0be487f0b2913337b04cd7e247cd160108d5f1ec029c1028fd0e236c4d57c9d2ebaf1ce87c2301d1dfaa8b99f2840eae5de3f2fd7d24f2dbf7fe0ff0cc03cad2a0f407e4cea498bf41ee47241d9b7fbb7436bf7929a1873df2216062d1d3be5331de93f4b063ef6063dcac5c4031ae64e0877656abfcac95714da619e5b0cf5588aae162d5c985a73bc2176657521280fff9ce2d88a23eaeeb34b4bd99772f10f8d95f311031d7bf2345dbbb289b872ab16309866a99b0bdaccb64e947e8a79bfd8222281db0ac30236e4af9751e62ae2030e977d4f433e39e87c9bd80ac14ce9869d852cd1d262e95329285c0d5405901fe0b2363d2a0fece6b031024de53ed9dba799f834908a344a28b0cbd220ea28d57857f3115b425fd65cb1aaeeb2898b4d83988cf3ece204523a42aee95154a9f2c1da8a3e4668f10037c431f70ccb3c8127217160ce9be4f92578ce029ad847c4298e555650654b1f8a86d9e26b517aab699d2ff4ee15a97d058f3899ebaebefcd4b7f0ade53dd6a8997e60d620ec79f48e4f7bd963d35568792a3983e7de7d7746e5475bd46c955c592a5bf078f7e878d020c377caeb37572cc1da71993fbfa720400bd68a7cc355c2d827f079a0c649d35ac8cc5d5bcfb8834abeaaa396592162e755dfe485bac5b963e4f22e9676023eb76cbecea52a401acfdda63d9237a0de670b1299614ca89878212fe088b3268fecbdffe95b4350a7e75a771e427bde4be079297ab68836076b68a6c8ae6cf918d5a5ab4df8008a40356962e49628ff05719ca25e30063e82e663e20a299d12ce0ee8e5458ab87dba6b05faf220670356c692b499ebc091c1132453a77b96804334a77899cb6a088dbef3ab527beec9ca39c6f1077de69bb3ca54b5371a69b0cb6c8a30bb03387f523896a1b116bab9145611cb071353465775fa762101edbde583cf80d7c88b79ce9af403ec303b446062baebfbaa1d5d6d59ef0656dc4da8d66b563adc80ba9e1b86eb32d6b7b94daf4e0a8395a4709a2a1195bb900c1107378033ee3a5841dc4c2ee9162a3e9612f5074190a9ad58658bf45740973d2fdda3ff7a289e8b959a644b01d9929b9ef3cee69648fbb42809af4c55e4e0de2aae00ddbb83fc8ced7cd59ebd5ec1bab17b909614f8d987e08d2628402abfde2cb67432537f0547932f56dee3b7e79a498dc4f43c02f5226178bebcb8fb39cbfc0ead4efb333ece25e9529cf5553dc0510ed8364602baf9a1c6ca389da624edc96262573da3d30bd020ee52b3a609e11d2b9b459ac0a9ac137043943f936cfda7e1ea85c6d066ec1c78cf1578855e68d6174c4aea2ff612e805f0a88d6f6566dba4e19057a8f1952712dc95e3dab515d92260d7194b78a339440c7c6d1c2f50bc378d2b276e66fb1ce9b463a58d9a0d8357ec7edc185acfb49b06981f520e02a76643b87f1c8bd10485376665f08056e4402dafc6049561d158728c3b7b7a68d5724e97a2f3a4cb7cbb545de7097b39ff8d8556ada019a742a6e0ca90ebe547bce0330d44e39df3c7fb4cf3ce7dbce78efb2d8f44ece041f02ba777fed430aac0c97a72e4156e388319501933c74da59a47ff167875e9c7043d44cb33bdf3aac969e48dd193facb73e20c239b724c4ddccee40ef99be3e93a53074234bddfa6f3db2a743ad04b6229cddb498f21b3c3f0fea87d4a50cc278ddd9bf3792000e4e9194be3b373fb602b75b4e443dfeb442095eea8815f16e830daed315b1ae51ec6948eeb17c44ea1229b8ca31e1e32da09d09daee62e81ba41745fbee9c69f77cb68dbbc0fb3d0d63983260aac0b92395717c90e946ab6992e71df266cbcccddffcabb73da92954fffecef6dcf023333a684b0491b48981555a6dcfa0987158c41271db944d7f85b838ed5c9d0bb2a8b6aa1f774adee90f66953ffa44465baecc522fa97a7e36875ec5466a941917fdf9e9fb000cbefc996422255b60e14a56843ab15aaaa74f2d743e9dbf21a0568a5166a000976bb1bdb48aa1a5c4e4b50690450f1377e0ed377188131fb0a2c482924b8df66872002bcdae88a8444c8edbfd29e4da3a0892ee200d06a8158a6f051f3c15f91e67e7d9d36e5ae529a68bda4b682ed1c5c546af7092f3d90e754fc024a61da19bbb1706221662fbc368b1bdabbe466548f4d1a9e230099d844383f658f07b3b5dc05d6c8ec3a2bb36a01627dee38a820b7960fedbc0b07b2f121c295f06091c4cf5345ce940c695c79fe52ff7b23bfd7b77233b50f1a0a7277a394a8e42da5f9c19fa7ace68a26f52bdecdc1e1be6a769139cfa58ba0ba5594c4bc9f2ce2c2b0ac3d4549de5ee0a224cc0a5541dd2752f470ab464196704ccf795ea4e5d901c34ab41c358e34a46cee0f4d2595497744fd14bee3d6959de8da0b32df6421d046145e50d3a2b00920df4ad718e29f3bb37bf56885c62af1be5b827e87f7c1b4c6199a50232f45abae3f5c41b9cbe84f3135e139f18f431949d4d6b69a73aa81e6a8304d954a1061724ec70befdd64d604f9f713aa2ffcbfbeedfa4f0cd96461a0a54b64987bbef402f8452d187edafb6739c765f23ea12e6f8345559303cce1298fde7e40b8993c52dde630993a7f5bb9991df4685a10af776aacd86cc008d29606393c75296ed8e439072b6011cfd9a5ada275e1301c84c2f0ce1814e9babd0ee157c2ee175ac727025192bc59e866ad53318d3526cdbcbfa4680fa0e9f226329b9c9600ed1e8089d3e5059fdbf382469b430f9fc453fe8528088ab7d79cce15338e1b1837c639d24e84e7f7f25ec978398cd43d3809695ac25f1a65a892a007a3459baaa82bd10fd2f0eac2330d7c5f3b0c61941cfb37b5a3a8016823cbe1c5ec41bc829b999f6795253fbaeb74d20fe58bb756267c1b7b9e96e030a8accb6d24fca3ee92ba70f477dbba21ab17081239d43d7578d6405cb9e8a720e9ce6ce1d5a754ace7ecf3b8d840fa1c15f0e93d8deac5877fe62a13b7c9e87afb0499076b197015de89dce60286879441366d51e310d76f75b3471d2c687caa67c585a5ab846b621b5bcffed4633bf65d81db6494f1357ee92f1dc848d4f7831cfbad25f099001141901a36ae07577ad499d9edb4df51952ae781082d688de9bd71fd53e642ffe629eb492a53e5ca7c6632035f5ef33396c8f21bcea6fb2414dab51f65b57ec6b28c18ab9e26cca45c42cff5a4784e8bdd31286890792195d09b34c0c7034741efc8c15825b4f0cd96b1ab10deda9b35831839726962c7f4a3eccbcaf66e366f5a163facfab665bfd2dfd46047529d726a199468dc86e663a1f36fdd21ac89f75cbb14847fa8fba2730938ff92c31fa8e3eff126c88f9eeb6db6a7e7817dcb700fa7d15878dac3b9c5efd11982fe8eb3a0128e38cae0519350f8b2e712ad57b9431e79b63f524980eb85633cbf7d1176aa0339cb534439f64fb33ebb5b331341fe081571ebae896e220268a54633f5016a31e11784e386642783a73fd026e1447af3f3dbca0f48c89fa997279af66c242002aebe49e86c0ab4271330e4a711e15ae180292e1039b77dfd315262a732b3fd8048d85ff6267d8e5e790291310e5f68fbb1a23c758ec161d41d7b6c0a12e70643c746802e4fa8a5237fb0546ce5b37d49420bc0fe5abff6f2a643f483327397638f8a7f49c0db58657fdc039cee382a85ea943bcd61a896bf6fbf083e1e1e1447f2da3827aa63d64efafeebe47f92347d8f68bbedcf49d6d298b7cd1d3521a68bb35cf71fcaf45272bb3e4e8fa26d565a9382a0969a733e6800c510e6dacd32295ec66028096a7ab9f2551266d1be6e86f6e2a3943e461c309c6c3935f8aab1d4323939b596f469369b70105fb40adfe41ed71a0b6b1ab56df10912f0fe40ca3e4b10f8227bf330652f4cc31f61ce3f7bc2ad92bd14625835f287d5e5dc90ca7a0f4871f317ccd479aa67530bb753f58d9a7f86675d9142283856c76082938a508cc9dfa503787ee3c17161bf09f900f19cf1aa75f8bc1ed736df1f57a07c8c6f6500a2cc126f9abc021bf96349f50fb01f1da13bfe2d2e286b14545218cb6942fe8b0d6d634243db8036c25f7ffde6d5a0188f28f53115715fd9c9872a02ba6dfff8cb83e2633692ad9f16038c8f47d638be036ccf9dc436d30290dbf21c86eac3600996fa4c669e4532619aee278856bdde6f6bda7c73a3b99528220fb5ae6fbdcf72328fac0cc4282dea04b60842833cbb13fd6f5ce43a402e6e9f13542d5e1cd9b76baebc13684503a67aba416f33f47a6341b36778a391eeb9e4960bc1794715e1cca3542586e15dbaf927daa8effbeaf6fb6139cf4d1ee0ab480d1195d6952f530cdb8524f958188db8b50d978e3c46c9286d9322160b5c67cdd329fbbfbfd6da0670acd322182b762138fb6e0c988320ec73906ccc1e74c33c17477548987f13c7a98c7ba73b0c5552a181c72af53b009c2ed5166156fc30d5368641be1c2036ced19a648531b446bf4a974c0c79b0f71643e965ecd69212588723f2c750a7f7c44828034412d69f8f042ca2617f0f3d7b4f90fbd65d4d607fb8f27f7b20e60619dfa0bb6e92958997c444233dc879bd418c568ea57bf54b1f366c9405e033cadef1b1cf9f788eae010c69beb0e0cd6051dedd24143d55fa8147ec7ace0a64a26cac2e217af8a4559ba2f492c85beaba1012cf94c1f32a93b393d9beeb1925908dffda606abd2f405f52dd05a4adaf3ace1780e315f27b097c097f3be29f2479451bae085152de7bd98c02a5ce5d4283fe68c8d2d5a9fe0152c1f3656d550a8638a9480a173361707a900cc51fc81ed66168fba4b40df27ce7f63be253e4c4d00404adb8d7d2b8ab3ade3787deafb6962f8ae071ab54410be72bc6f6b11d1c7d0985de9577f8d0056c4d86e411d501e3f5f166506e586728b85a7d7f90fc8c7c90bd836c8c0d1f9ce07d9fd81f93a00f0b4ae5121b486c2ca3aa8ea2233693fd9fb4b2f92c3481f8d7ae7e32ccb3e3909a7cb5e89292196aa02d83448220ea546a9e457b69569ef0e8b8c03328ac79d07ce92fc1db0010d6654141644087de1d39bc1f93ccffdd3f49cbe66ceb963d22ffdad414a0892bce53b3703b228e650ad97a2af92819a8e5b3cd68b3205cf2763cbc94419a301cb311d55d7becd43f0f37529e5fc43364e7292d7ae351585bf5f77278951907dea98d9c25e36a3f2b2ba1e68df4fccc8bab21e59dba1e9abded3da726b3c4343a767e64d9e737a589cd16dc6"}) 16:44:02 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000002040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') getpgrp(r0) r1 = getpgrp(r0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, {{0x1, 0xfe9, 0x2, r1}}}, 0x28) r2 = socket(0x2, 0x800, 0x0) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8080) 16:44:02 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x4000, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x1100) 16:44:02 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, 0x0, 0x0, 0xfffffffffffffffc) 16:44:02 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) [ 577.518197][ T3918] binder: 3914:3918 unknown command -1583047204 [ 577.541712][ T3918] binder: 3914:3918 ioctl c0306201 20001040 returned -22 16:44:02 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, 0x0, 0x0, 0xfffffffffffffffc) 16:44:02 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) 16:44:03 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000240)) socket$can_j1939(0x1d, 0x2, 0x7) 16:44:03 executing program 0: clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:03 executing program 1: sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4) getresuid(0x0, 0x0, 0x0) 16:44:03 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_usbip_server_init(0x5) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x3d, 0x3c}, 0x0, &(0x7f0000000140)="d7034c50f49364435a3803651e765a37e58680de7def1e5c7fb23f979478ca7171b0a04fb51eb4577d4055a5e13d93844df0a85a8b35ee7a40d71bcf4c", &(0x7f0000000180)=""/60) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40002, 0x2, 0xb}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x486e02, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x43}}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_NET_NS_FD={0x8, 0x7, r3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20044015}, 0x4004004) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:44:03 executing program 4: syz_open_procfs$namespace(0x0, 0x0) 16:44:03 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, 0x0, 0x0, 0xfffffffffffffffc) 16:44:03 executing program 1: getresuid(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x12}) syz_open_dev$dri(&(0x7f0000000000), 0x81, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 578.330203][ T3952] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 578.336794][ T3952] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 578.376452][ T3952] vhci_hcd vhci_hcd.0: Device attached [ 578.404457][ T3957] vhci_hcd: connection closed [ 578.404973][ T132] vhci_hcd: stop threads [ 578.416613][ T132] vhci_hcd: release socket 16:44:03 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x4002, 0x1) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x8) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f00000001c0)={@id={0x2, 0x0, @b}}) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000040)=0x4) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000080)) syz_usb_ep_write(0xffffffffffffffff, 0x9, 0xf8, &(0x7f00000000c0)="411acd46683d801c8c48eb24b9e0376b3b214faf26b6decf4e09f1a5912c00897fc390e9b3213ede410bd786f980ae974be1bddb6e130919d20ac9faf40c5a26f4e03a74267edeaac72b42949c467ef5bc6a9af05683fc30a295b9a59c34d82d17541455c1cee8cfbff5d7e497b9902bccd6cc967056809f4acd28e66fd53772d34bbd0e3f79c4b8c9d810a967431ef5d4975ca94227f7edd4e2bba89012db3d6811b956299952f6b27a4388359d47a66b170c08668c66dc496a98d8c2ed7b82bc6041152713d69734564e97d6ef3e1aff12580b8882551d31d4017b73b240f39b4769b1b40307be61802c6f6f8e3db0c1d19e62975e8b86") ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000280)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) 16:44:03 executing program 0: clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) [ 578.429447][ T132] vhci_hcd: disconnect device 16:44:03 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be2dc09329242a7cfb0033a8bd222c59b855bd926c61f01deae90ebd664cab4582dac9304489cef223bc5adf673e2a048d299fa80b28c812874382ff356afc8e"}, 0x48, 0xfffffffffffffffc) 16:44:03 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x10800, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x6, 0x3ad, 0xb5f}}, 0x28) getresuid(0x0, 0x0, 0x0) 16:44:03 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:44:04 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000240)) 16:44:04 executing program 0: clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x6e, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:04 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x10010, 0xffffffffffffffff, 0x8000000) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2010, 0xffffffffffffffff, 0x8000000) r1 = syz_open_dev$sndpcmc(&(0x7f0000002100), 0x8, 0x101000) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0xc1004111, &(0x7f0000002140)={0x7, [0x6, 0x3f, 0x100], [{0x1, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x47d, 0x6}, {0x200, 0x3, 0x1, 0x1}, {0x7, 0x1, 0x1, 0x1, 0x0, 0x1}, {0x6, 0x6, 0x1, 0x0, 0x1}, {0x4, 0x7, 0x1, 0x1, 0x1, 0x1}, {0x3, 0x7, 0x0, 0x1, 0x1}, {0x3ff, 0x91, 0x1, 0x1}, {0x3, 0x40, 0x0, 0x1}, {0x9ef, 0x100, 0x0, 0x1}, {0xff, 0xef, 0x0, 0x1, 0x1, 0x1}, {0xfffffeff, 0x45, 0x0, 0x0, 0x1}], 0x200}) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x7, 0x8, 0x0, 0x9f, 0x0, 0x1}, 0xffff) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000004280), 0x2, 0x0) r4 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000042c0), 0x1, 0x0) kcmp$KCMP_EPOLL_TFD(r2, 0xffffffffffffffff, 0x7, r3, &(0x7f0000004340)={0xffffffffffffffff, r4, 0x10000}) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000004380), 0x2, 0x0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r6, 0x6b, 0x3, 0x0, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r7, 0x6b, 0x3, 0x0, 0x0) read$FUSE(r5, &(0x7f00000000c0)={0x2020}, 0x2020) 16:44:04 executing program 1: syz_open_dev$sg(&(0x7f0000000000), 0x2000000000004, 0x20200) getresuid(0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="c39a9e8b4c9e6835c6e069be16c95c458f61433636e3bf1bd905d89d51d5451dd4bb950cf9d2d49b82355c1f9500cf76c739970cac42f7377217ef15abf2ba95f748fc1f91addcd01acaeeac2c20cd301b2a70930c08e13ed9729098b5dc03b004b26e9b843fcf2dff1f291ed9cf236437787ecd667d3a121a9071058d0f1b0dbd64141c122aab28f54abd056eac65c34037ef624165cae59102c8c241484a13cfe589964f71c2b8e56dd171e5b87b787b9830e539e0f737f65dbf45849a4777bd36ae94e0eec5915407c3b1e2c298ca15bd898ddf8c4a5b6474f18941a42b595a07bf854ef4b0abe5ce418d80b49278f95bb0599ecd081298903bf945e36a772c2e58e585606aa668b1ca3c7445dace75d45beaa5f3d73c2839ad159539db1b447acfdea01bd627fd1ca8b2a1d4421e6dcbadbab9dac57884dcbcbe86165e4cefad2bb77c22472723e49f9f437052820485e7593cbfe100549da9b45649c9ddc6babea3c0a64758bb39ecdaabcce197e245e2fc567bc03a580060512e82536c07cefbdcc75ab9038f9d63b5890d82a5aa65ce37a753c88c7ec8b47f9dfcd6dd78b6db18f4b37782c30b5ec92408a21ead90f75d29392d3a7a1ef90221ce975626db38cdf7ae8de084adc132289e13cafcd0aaaf96ca17508d8f3a431fddf4421fa0d81e7f0d7270858314204d07b3405939faf2fccf553e301f470529b43383bad53999ac98cb741b6b666d8eff5ec681a97c9ead1bcf03c119da797b070fdcda768ce89449c531a6c4af52f5b57efb808a0f22d1c095337fedead88fd8e37594c59031dd846bba29d38a5735319f39ab3b2edfd12766492a04f3e6b640f0151da31134f7a5f4a8e1be5bc07eb28f593f0af0f5867fc2215d93d63db0f0e9b5527751dcce2a164270b51ff551fdf91ba59fdba81fbf912c1a7fb30ea843a37aeda78460e58323e3566d75e0a06a2cf208e949e821d5f251f454a313a628b9a6d01b2b7b9df9672d59a33cd2d14532cecea5a89f4b31c1a770f6b24f4244acd12f10edbdd942f20c9a4a95a8f084a0357a0f02198449f304734e455569981a8225e2d04963bf883bac01902dbda42dae1cebba7279a4cfc1d2dbb0ea07d5761bfd303e5c8d73ad230a84cabd3c13d1249a64036b75dea529a5974ef0f7210ed8033f105e16816c7a01c17a6a8d2251dcd1451e2effe597044b64ccd03a9fa8cc680421b3403bcdcefaf541672c900f66e9798db627cee11ce28ed4f1f959ced3d40ee891105da7c03d06467812f20e5781ff320bb794a39a1f2c73a50cb04ae9c8d15757ca67e6b510ba1ff77ffac6a700d500c11fc68478800022cb2a6a48f3adc78c0a8f682ead8ae02e4edf87bf9cebb31782f65d33bf2eb9f56b5524b13a9dca8170f904355045d4ac3b5dc5e95736fd489411a2ce71d54fca32a5c66219eb5528f6cdfbccb60fd1176a5e0bb6c8131c40f98391f90359a504b1fb55fa538a54b8b1210684546f940ed8891ba073eca7dfd427a4c33ab344c7ea9a3056f1c472838279e84f2aacbab79bf8aa616812fd310c2d6bbf9c9949c6a41ec0a60cb10adecac7ca5ab26fb1d25ad098652a75e4a2cece0f3e8fe8d46ebc6e3b6deadc76612200ec0087e191e1caa778544e5ee330b952a69027ad27dfd651f568a31c1130108f224fcc6da983a8d7aceaf524f6b1287f31b011ba04a1d5376f0fe34a1109f866146f6537dcc0a07eb9c387fd9dbc138952898b41611edf3fc93d11143d8fe6ad0da0a3744eaf47694e4057d97973a12f8b314fcff9e3547f003fd6feba5e2d17348524de4a306a9dd1b86a03353d49ccbf4dc00ab3e4bd9218b187e33e97ddf3ebbe53a69678d5f62e24c9f832f404e3e2aef54b21e4501d35edcf83d965b91619b15e8549edb76e3b66d000c78c07cc6cecc279f2102034132d874be24695ccb6a76c9e2a7684484c6fc2f76c7d576e978c2c8e1f9cda3046b4625ab4412f427b334914b392aacf4060074edfe2d700a516a61f2f82d8ebb651578d6e41463abe2091e828926cf8a2d239e83a4030f527269a313a7abd48807852f946aaf1644d00ab06fb6ccd6547d6f95cd8c831c6473151f40bcebaf94c8d9795e52fcd703112c79187da31d24e20be104648477a50a8bfd0e8f4bbf7b337082831d13e081640410aeef0624e45a840acfe7b7ef49bad062500165ad4e5c56632903fcdb1fa6dd7a13902c44452b49d3afbc18e3b27aaed0c9c01cdfaa869c2937aa3ee081833f3c9f75d4115068c23cdcc6d765be48a86ad4f7c927ed055522528bd59039823fc94905d6e2beadb40a38bdcca27c5b90112a2dc72d9439ff917b01e9e5ef3ebfbc19cf825f5d0b9a00a3a8868d405b6e78ddb9d2ddb2631247ad2625bbf50d0c260d6cb7a834d1e6354bf7a6fb2fa5abadbaeccb02d9faf8444c60507fa50da964c04944a56aeaaee379b147900a3dce88075b7da08d231b26fbefac81ec7cf12e2d5d575324e9aeb7bc69f81730058c0ef705e2b273af13dd04156d869c91d16695391cb68e1a95cffd95a516fb927fb45abc428d25e29f351b5f7e2926301e4e2e6a19513986cc204eea3c91f3b86ae39bf18418d8263c8dacae26e9cdbcb1f3bbce36b1c3aff433b071cd2793a6803ecad4cdd4255dd8bde2bf985abe10969d1ddba1964373a588763718a1850582db0784ef086dd71bf7f3b69d0b5e61860988a78d3a1fd0c982c0bb401810ce8371da5ec155be39f3d7970f39f8285643b307b930b6942f631ec06da2ec8ac1349b570f7ff8eb0d469459b5446265a67f9e4513215fd9d61a7f0c11e749e867d68b6e8dec4910a1105a278cb57f534ecf19c1220871b69da80925195fb6e346dee4264adc12c83a52859bd0dda3f949240e881dd56cef973da7710714cff90644f50e310d94be134a2a2a9cabe9e6f642ef6b279296fa85785cb19e6bd29c3b4f5f0b1a09ae1a02f01a833bc14fa3203173613f0ea90ae40740f23115cbe449a9b082f77db1f544327740d4524e9ba7b72f2dd109a23ea9589895aaaee2158e72f6ae7388fff299d6de8c63123858628f967b23d93423b7bacbb40caa4f760d325fc9a58727b0bbfa013cff9bd1ab400b22e7ae6021ce7066d09e7e64f840d0c128bad0e12dbbe941c5aa95fddc6eba9a7da12de23ea69f178f521667b0cdf5c799bc0c40b599d9778570f607d678a823e05ae0dd4954bab1c3f2be19f5dab1b7acc393ffcad4c8e5452f4ad554c3ef7cdc50ddf310f4ae7fae7d42cc0d59a4e6deeb5320bf57d7eb8a17d176c9dd926b053e52e6688f6cf6b3eb723cb617b57e4a3ae8c82fca15bc644c6e20585f8d697cbc627d3e87c8cabc847b42f1552f2f288943f182582eb10b566fb7b26dc5a04ee99fbe0bdc8b04201ce5eb4de11b5c11eb606e2f94cdee73e803c3c51233dca150b7c4b286beba15b8c8f505f0b3462b980f4ca15a50355769dae667fc3800ee1e00574ad7a4efba830a273f782b7ed5f7b582958f973e599036d92308e76deef46c7724916171b80cc34782e1f195920280365005c2971b45ef11c61253ff403139466096635c3840c10e18a50c19fe3f1c469b73589258c33cb6325c1e74cf56045a83ea47e7a5b2c2275025f87ad3dbd0d6de1e4b42c963c1a521a3c9333bf21cb2fa857246f7ac0f1b6f31a42dc9931aac0719afc72e4090f18004d6cf4f7c435a8ebd621ed18dac15039f2e718fb798853578ea5e568d522f4c3a893db7366eb0d11995c632027b3fb0b8a2babe7ff7346c1f16a53eccc8dfd234240ac7397df768b50d2a901253e660005192e7bb6a55eec576d94d418a18a8262236b76aa6b8479561a137987fa6dab1a5f883d59bb24c9f0a2c309ed548c2e73f5a9cb6f167b14ee82fd4043f18fea17bde1c627d6c69ce78300e2b1efb9fe5719810c5dbc45a07b08e4b17f03e97c354b3c8e5c860f71c90749937eca2b958a02f01ac9f4e051bea2930c7382507132d372fa03732167d2c1d824bb0ae961ab0662c01ce0f7d7d35ca94efdb7273277b52ef3842d24cc3fd07c7edb3d58417558478ba6053f0b1cb63c9ec5a96cc31cc8392d36c0e3f4792b74e1c52f0e8f31bfad25dbaa979e3e888cb99596f78e12168290a571e18b9051fde0389450d4313b7f901666fb3d915ca90b0f97ee787b27e35a0019db17e7171670e42ac35fd69ce4f5a28a8edb780235dc8948b7dd7554ab00b5c290066466cf797402204a061e4e21383978ec7a33a39168a2339de435135fd1520fc7f2d6c17e7d8043b228e1d3ed4273fe318788df8c72024fc433bad2010028d1eba4d17e8160e682adfd432c1c93d0338abfc4af7935f1c2ad4d78626b72f34cdac4a33b977a05b2dee810c3b9c176bc387eee41a5583339087b05268ac382e153004411084019194c726bb94288ea368a020354898fbcc7a903153b39500fbd749441436f6a29cf2eaa68bd9a73dfff8872f386a0043b326d17defd6a33488c7b526b1fc8d4e8b0332245d5a35bd51a39b0ffccbdd2ef876a160ed4b03ad6d7963a0340b31a27983ce46f1ea890a804b239d42ff1323464b647ef985e7df6e11c805e6b0bfe7d0c5f7050c811ecc3d42963c887f72c6f0eab75b2064d947ffb6957cd206f1f65c675dd90a9aa3f47de5f9a9cd7e6bce38149cb575d8992a160569e1c5df72efc85b1e79f307d6d85a12705b84a067bce919d0c858186d8b89a242d82cd9ccec11f36a2f643d281ed073b5cc1e47e8909f0ca9cc9d6eb8f8712a3bc7ed1f39511329021fc11844608235d5be4f6900b29964e98aef915c8975bff914c96d254ba5252acf32f052d31607b16284eb6f2ba9a01011d62c10d9446d2494b1741aaee9cde74799e194b2a1f60d8fcba1c80fc1a28e9513959d180a159092d7da7fb2b30fdc35e997bb67ae2f44d76a2065d86ebb4051d9d5568749d7dddadb6f52040c39575f4157309159420a50d1800a1f50c1e75f2e16d83ce4f647b60a9c08b7c4440e6f5421db490bd8cc601d82f070edd419dc1ebaac31b5ec577b10cbb11804257e6b04c0014217cd959d4f8e640e5d9fa06939fe63ffd8c068ed531bf089c1898bc5aa7bac050a51457d014353e015f036bb656142591b5f9111e3f61ffccbb18ac6fb6195e8eb89a2c9b0b43f6e4d6654bf4fe12ac18f4c72ed96656768ed79392c5cb8de6fc221bc440c5cbc416679fca0e5fa2f97a0b251f52bfc8bca4988312c5d72438c9cdc5c08bf07075e4f617e39b04619b2c7e20a4ea04fa369a498d93a293c144080aa45d5eb60c63c2d43313ff97e98b73ee773690e60c302cb4951dc2b7113567fc0f71644dba3053addb74725e48bc9591e68bc4d5ede852292e634b963c429d07ff63471e7baf13e75b4ebaa67df48c26f78f06b5f3579f4ac2b1bc697b53c8cd979aa7a23ef0753789477e0ec9f6f53dfd37c4dff6644c444a4bcea58caa1427efcf15cc5e2f17478e4ac2a83b3abbbafde17740349b04773c941560965c03f14f95e805fc448015877009f949babfe457b6899339407b95be047b716b974d3ff97f79dfe224082be318134ba34680204f9e92dd948de44d0a960ee1e18f00b668e603d048d2ac6f344ce8b066ab4a6d8944927f8582a7751814f51f4b6abe89d9059a7a0f24cce8e13b8db75c59a0079bf0f3300bc7b61480274205c51becef059f8447d8c6cb2db6b37f84c5a67c39465b89a6f8a8cd312154128caa72dcf569e246e156e9037a127f9ca567bde4f6102de1ee", 0x1000, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000010c0)={r0, 0x1000, 0x42}, &(0x7f0000001100)={'enc=', 'pkcs1', ' hash=', {'md4\x00'}}, &(0x7f0000001180)="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", &(0x7f0000002180)=""/66) 16:44:04 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:44:04 executing program 4: syz_open_procfs$namespace(0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) socket(0x1a, 0x5, 0x2) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f0000000240), 0x4) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) connect$can_j1939(0xffffffffffffffff, &(0x7f00000040c0)={0x1d, r4, 0x3, {0x2}}, 0x18) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, 0x0, 0x0) accept4$packet(r5, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14, 0x800) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYBLOB="68010000", @ANYRES16=0x0, @ANYRESDEC=r0], 0x168}, 0x1, 0x0, 0x0, 0x4841}, 0x4040000) setsockopt$SO_J1939_PROMISC(r5, 0x6b, 0x2, &(0x7f0000000000), 0x4) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r6, 0x6b, 0x3, 0x0, 0x0) syz_io_uring_setup(0x64e0, &(0x7f0000000140)={0x0, 0x0, 0x10, 0x3, 0x28d, 0x0, r6}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 16:44:04 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000006340)={0x28, 0x0, r1, {{0x9, 0xbbd, 0x2, r0}}}, 0x28) read$FUSE(0xffffffffffffffff, &(0x7f0000002040)={0x2020}, 0x2020) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(0xffffffffffffffff, 0xc0245720, &(0x7f0000004080)) syz_open_procfs$namespace(r0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f00000040c0)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000004200)=[{&(0x7f0000004140)=""/174, 0xae}], 0x1, &(0x7f0000004240)=""/96, 0x60}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000065c0)={&(0x7f0000006380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x124, 0x124, 0x7, [@enum={0xf, 0x1, 0x0, 0x6, 0x4, [{0xe}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0x4}}, @var={0x10, 0x0, 0x0, 0xe, 0x2, 0x1}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x40, 0x6}, @enum={0xe, 0x1, 0x0, 0x6, 0x4, [{}]}, @enum={0x5, 0x7, 0x0, 0x6, 0x4, [{0x3, 0x1}, {0xd, 0xc17}, {0x3, 0x60}, {0xc, 0x1f}, {0xa, 0xf89}, {0xa, 0x1}, {0x5, 0x6}]}, @const={0x6, 0x0, 0x0, 0xa, 0x5}, @fwd={0xa}, @enum={0x1, 0xa, 0x0, 0x6, 0x4, [{0xa, 0xfffffffd}, {0x6, 0x2}, {0x0, 0x1}, {0xc, 0x5}, {0x7, 0xffffff81}, {0x0, 0x4}, {0x8, 0x7f}, {0xa, 0x5201}, {0x2, 0x5}, {0x8, 0x80000001}]}, @restrict={0x8}]}, {0x0, [0x5f, 0x5f, 0x61, 0x5f, 0x2e]}}, &(0x7f0000006500)=""/149, 0x143, 0x95}, 0x20) 16:44:04 executing program 2: ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000100)) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0, 0x1, r1}) 16:44:04 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:04 executing program 1: getresuid(0x0, 0x0, 0x0) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000000)=[{0x3, 0x2, {0x2, 0x0, 0x4}, {0x1, 0x1, 0x1}, 0x0, 0xfe}, {0x3, 0x2, {0x0, 0x0, 0x4}, {0x1, 0x0, 0x1}, 0x0, 0x1}, {0x0, 0x2, {0x2, 0x0, 0x2}, {0x1, 0x0, 0x4}, 0x1, 0x2}, {0x1, 0x200, {0x2, 0x1, 0x4}, {0x0, 0x0, 0x2}, 0x0, 0xfd}, {0x3, 0x0, {0x2, 0x1, 0x3}, {0x1, 0x1, 0x4}, 0x0, 0xfe}, {0x0, 0x2, {0x1, 0x0, 0x1}, {0x1, 0x0, 0x1}, 0xf56688e48901b384, 0xfe}], 0xc0) 16:44:04 executing program 3: syz_open_dev$sg(&(0x7f0000000000), 0x2000000000004, 0x20200) getresuid(0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="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", 0x1000, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000010c0)={r0, 0x1000, 0x42}, &(0x7f0000001100)={'enc=', 'pkcs1', ' hash=', {'md4\x00'}}, &(0x7f0000001180)="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", &(0x7f0000002180)=""/66) 16:44:04 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000002040)) syz_open_procfs$namespace(r0, 0x0) 16:44:05 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000080), 0x9, 0x98e00) 16:44:05 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:44:05 executing program 3: syz_open_dev$sg(&(0x7f0000000000), 0x2000000000004, 0x20200) getresuid(0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="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", 0x1000, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000010c0)={r0, 0x1000, 0x42}, &(0x7f0000001100)={'enc=', 'pkcs1', ' hash=', {'md4\x00'}}, &(0x7f0000001180)="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", &(0x7f0000002180)=""/66) 16:44:05 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x4040, 0x60) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000041c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000006240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = getgid() read$FUSE(r0, &(0x7f000000af80)={0x2020}, 0x2020) getresuid(&(0x7f0000008840), &(0x7f0000008880)=0x0, &(0x7f00000088c0)) read$FUSE(0xffffffffffffffff, &(0x7f0000008900)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f000000a940)={0x638, 0xffffffffffffffda, 0x0, [{{0x6, 0x2, 0x10000, 0x0, 0x81, 0x1f, {0x4, 0x100, 0xfff, 0x20, 0x8000, 0x5, 0x408a, 0x5, 0x5, 0xc000, 0x6, 0xee01, 0x0, 0x6, 0x3f}}, {0x5, 0x1f, 0x1, 0x6, '.'}}, {{0x5, 0x2, 0x7f, 0x1000, 0x85e1, 0x9, {0x4, 0xd24d, 0x80000000, 0x7, 0x8, 0x1eaa0e71, 0x1000, 0x8001, 0x3, 0x1000, 0xd1, r1, 0xee01, 0xe7a4, 0x3}}, {0x1, 0x3, 0x5, 0xffffcba2, '))&\xff-'}}, {{0x3, 0x3, 0x9, 0x6, 0x20, 0x6, {0x2, 0x100000001, 0x81, 0x8001, 0x1, 0x80, 0x4, 0x8, 0x7, 0x8000, 0x1, 0x0, r2, 0x6c3, 0x873}}, {0x5, 0x3, 0x0, 0x4}}, {{0x4, 0x3, 0x5, 0xffff, 0x3, 0x8, {0x4, 0x3, 0x8000, 0x5f7, 0xb8, 0x100000001, 0x3, 0x8, 0x10000, 0x6000, 0x2b, 0xffffffffffffffff, r3, 0x8}}, {0x0, 0x7, 0x0, 0xfffffffe}}, {{0x2, 0x0, 0x3, 0x6, 0x3003, 0x4, {0x6, 0x1846467a, 0x3, 0x97c9, 0x2, 0xcb, 0x2cd, 0xff, 0xb8b, 0x6000, 0x349, r4, 0x0, 0x2e1f, 0x8}}, {0x4, 0x9, 0x2, 0x0, '$@'}}, {{0x0, 0x2, 0x4, 0x6, 0x8001, 0x2, {0x0, 0x1ff, 0x15, 0x9, 0xfffffffffffffffc, 0x9e, 0x0, 0x2, 0x3, 0x2000, 0xb16e, 0xee01, 0x0, 0x2, 0x6}}, {0x1, 0x3aa2, 0x3, 0x2, ',^]'}}, {{0x4, 0x0, 0x4, 0x0, 0x1ff, 0x1, {0x2, 0x200, 0xfffffffffffffffb, 0x80000000, 0xfffffffffffffffe, 0x9ee, 0xfffffffc, 0x6, 0x6, 0x8000, 0x4, r5, 0xee00, 0x3, 0x7}}, {0x5, 0xfffffffffffffff8, 0x6, 0x7, '*+%&-\''}}, {{0x5, 0x2, 0x3ff, 0x8001, 0xf, 0x3, {0x0, 0x100, 0x2, 0x46, 0x2, 0x4, 0x40, 0x7, 0x40, 0xc000, 0x85, 0xffffffffffffffff, r6, 0x4, 0x9}}, {0x6, 0x8, 0x3, 0x8, '^.+'}}, {{0x3, 0x1, 0xbf, 0xfc, 0x2, 0x8, {0x3, 0x6, 0x4e0, 0x3, 0xffffffffffffffe1, 0xfff, 0x7fff, 0x3, 0x8001, 0x1000, 0x5, r7, r8, 0x401, 0xff}}, {0x4, 0xfffffffffffffffb, 0x3, 0xffff, '(\\@'}}, {{0x4, 0x3, 0xffffffffffff8000, 0x0, 0xbb82, 0x5, {0x1, 0x1, 0x3ff, 0x8, 0x3, 0x9e32, 0x9, 0x5, 0x7, 0x1000, 0x3, 0xee00, 0xffffffffffffffff, 0xe8, 0xc5e00000}}, {0x0, 0xadf, 0x0, 0x2f6}}]}, 0x638) 16:44:05 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) accept(0xffffffffffffffff, &(0x7f00000003c0)=@can={0x1d, 0x0}, &(0x7f0000000440)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0}, &(0x7f00000004c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000740)={&(0x7f0000000580)={0x16c, r0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @HEADER={0x4}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}]}, 0x16c}}, 0x40) syz_open_procfs$namespace(0x0, 0x0) 16:44:05 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000000)={0x1, 0xffffffffffffffff, 0xffff, 0x1}) 16:44:05 executing program 3: syz_open_dev$sg(&(0x7f0000000000), 0x2000000000004, 0x20200) getresuid(0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="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", 0x1000, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000010c0)={r0, 0x1000, 0x42}, &(0x7f0000001100)={'enc=', 'pkcs1', ' hash=', {'md4\x00'}}, &(0x7f0000001180)="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", &(0x7f0000002180)=""/66) 16:44:05 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x42001, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000200)=0x80000001) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000180)={@desc={0x1, 0x0, @auto="bc21d75bfeef51fa"}}) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000000)) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 16:44:05 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:05 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468ff00000040bcc112f862783c7430d8ad903e8d1e485500005830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) keyctl$assume_authority(0x10, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000000)={r0, 0xc, 0xd9}, 0x0, &(0x7f0000000040)="f26c248fb12d3c7de67a8228", &(0x7f0000000180)=""/217) 16:44:05 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r1, 0x0) 16:44:05 executing program 3: syz_open_dev$sg(&(0x7f0000000000), 0x2000000000004, 0x20200) getresuid(0x0, 0x0, 0x0) add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="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", 0x1000, 0xfffffffffffffffd) 16:44:05 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) 16:44:05 executing program 1: socket$kcm(0x29, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) 16:44:05 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) 16:44:05 executing program 3: syz_open_dev$sg(&(0x7f0000000000), 0x2000000000004, 0x20200) add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="c39a9e8b4c9e6835c6e069be16c95c458f61433636e3bf1bd905d89d51d5451dd4bb950cf9d2d49b82355c1f9500cf76c739970cac42f7377217ef15abf2ba95f748fc1f91addcd01acaeeac2c20cd301b2a70930c08e13ed9729098b5dc03b004b26e9b843fcf2dff1f291ed9cf236437787ecd667d3a121a9071058d0f1b0dbd64141c122aab28f54abd056eac65c34037ef624165cae59102c8c241484a13cfe589964f71c2b8e56dd171e5b87b787b9830e539e0f737f65dbf45849a4777bd36ae94e0eec5915407c3b1e2c298ca15bd898ddf8c4a5b6474f18941a42b595a07bf854ef4b0abe5ce418d80b49278f95bb0599ecd081298903bf945e36a772c2e58e585606aa668b1ca3c7445dace75d45beaa5f3d73c2839ad159539db1b447acfdea01bd627fd1ca8b2a1d4421e6dcbadbab9dac57884dcbcbe86165e4cefad2bb77c22472723e49f9f437052820485e7593cbfe100549da9b45649c9ddc6babea3c0a64758bb39ecdaabcce197e245e2fc567bc03a580060512e82536c07cefbdcc75ab9038f9d63b5890d82a5aa65ce37a753c88c7ec8b47f9dfcd6dd78b6db18f4b37782c30b5ec92408a21ead90f75d29392d3a7a1ef90221ce975626db38cdf7ae8de084adc132289e13cafcd0aaaf96ca17508d8f3a431fddf4421fa0d81e7f0d7270858314204d07b3405939faf2fccf553e301f470529b43383bad53999ac98cb741b6b666d8eff5ec681a97c9ead1bcf03c119da797b070fdcda768ce89449c531a6c4af52f5b57efb808a0f22d1c095337fedead88fd8e37594c59031dd846bba29d38a5735319f39ab3b2edfd12766492a04f3e6b640f0151da31134f7a5f4a8e1be5bc07eb28f593f0af0f5867fc2215d93d63db0f0e9b5527751dcce2a164270b51ff551fdf91ba59fdba81fbf912c1a7fb30ea843a37aeda78460e58323e3566d75e0a06a2cf208e949e821d5f251f454a313a628b9a6d01b2b7b9df9672d59a33cd2d14532cecea5a89f4b31c1a770f6b24f4244acd12f10edbdd942f20c9a4a95a8f084a0357a0f02198449f304734e455569981a8225e2d04963bf883bac01902dbda42dae1cebba7279a4cfc1d2dbb0ea07d5761bfd303e5c8d73ad230a84cabd3c13d1249a64036b75dea529a5974ef0f7210ed8033f105e16816c7a01c17a6a8d2251dcd1451e2effe597044b64ccd03a9fa8cc680421b3403bcdcefaf541672c900f66e9798db627cee11ce28ed4f1f959ced3d40ee891105da7c03d06467812f20e5781ff320bb794a39a1f2c73a50cb04ae9c8d15757ca67e6b510ba1ff77ffac6a700d500c11fc68478800022cb2a6a48f3adc78c0a8f682ead8ae02e4edf87bf9cebb31782f65d33bf2eb9f56b5524b13a9dca8170f904355045d4ac3b5dc5e95736fd489411a2ce71d54fca32a5c66219eb5528f6cdfbccb60fd1176a5e0bb6c8131c40f98391f90359a504b1fb55fa538a54b8b1210684546f940ed8891ba073eca7dfd427a4c33ab344c7ea9a3056f1c472838279e84f2aacbab79bf8aa616812fd310c2d6bbf9c9949c6a41ec0a60cb10adecac7ca5ab26fb1d25ad098652a75e4a2cece0f3e8fe8d46ebc6e3b6deadc76612200ec0087e191e1caa778544e5ee330b952a69027ad27dfd651f568a31c1130108f224fcc6da983a8d7aceaf524f6b1287f31b011ba04a1d5376f0fe34a1109f866146f6537dcc0a07eb9c387fd9dbc138952898b41611edf3fc93d11143d8fe6ad0da0a3744eaf47694e4057d97973a12f8b314fcff9e3547f003fd6feba5e2d17348524de4a306a9dd1b86a03353d49ccbf4dc00ab3e4bd9218b187e33e97ddf3ebbe53a69678d5f62e24c9f832f404e3e2aef54b21e4501d35edcf83d965b91619b15e8549edb76e3b66d000c78c07cc6cecc279f2102034132d874be24695ccb6a76c9e2a7684484c6fc2f76c7d576e978c2c8e1f9cda3046b4625ab4412f427b334914b392aacf4060074edfe2d700a516a61f2f82d8ebb651578d6e41463abe2091e828926cf8a2d239e83a4030f527269a313a7abd48807852f946aaf1644d00ab06fb6ccd6547d6f95cd8c831c6473151f40bcebaf94c8d9795e52fcd703112c79187da31d24e20be104648477a50a8bfd0e8f4bbf7b337082831d13e081640410aeef0624e45a840acfe7b7ef49bad062500165ad4e5c56632903fcdb1fa6dd7a13902c44452b49d3afbc18e3b27aaed0c9c01cdfaa869c2937aa3ee081833f3c9f75d4115068c23cdcc6d765be48a86ad4f7c927ed055522528bd59039823fc94905d6e2beadb40a38bdcca27c5b90112a2dc72d9439ff917b01e9e5ef3ebfbc19cf825f5d0b9a00a3a8868d405b6e78ddb9d2ddb2631247ad2625bbf50d0c260d6cb7a834d1e6354bf7a6fb2fa5abadbaeccb02d9faf8444c60507fa50da964c04944a56aeaaee379b147900a3dce88075b7da08d231b26fbefac81ec7cf12e2d5d575324e9aeb7bc69f81730058c0ef705e2b273af13dd04156d869c91d16695391cb68e1a95cffd95a516fb927fb45abc428d25e29f351b5f7e2926301e4e2e6a19513986cc204eea3c91f3b86ae39bf18418d8263c8dacae26e9cdbcb1f3bbce36b1c3aff433b071cd2793a6803ecad4cdd4255dd8bde2bf985abe10969d1ddba1964373a588763718a1850582db0784ef086dd71bf7f3b69d0b5e61860988a78d3a1fd0c982c0bb401810ce8371da5ec155be39f3d7970f39f8285643b307b930b6942f631ec06da2ec8ac1349b570f7ff8eb0d469459b5446265a67f9e4513215fd9d61a7f0c11e749e867d68b6e8dec4910a1105a278cb57f534ecf19c1220871b69da80925195fb6e346dee4264adc12c83a52859bd0dda3f949240e881dd56cef973da7710714cff90644f50e310d94be134a2a2a9cabe9e6f642ef6b279296fa85785cb19e6bd29c3b4f5f0b1a09ae1a02f01a833bc14fa3203173613f0ea90ae40740f23115cbe449a9b082f77db1f544327740d4524e9ba7b72f2dd109a23ea9589895aaaee2158e72f6ae7388fff299d6de8c63123858628f967b23d93423b7bacbb40caa4f760d325fc9a58727b0bbfa013cff9bd1ab400b22e7ae6021ce7066d09e7e64f840d0c128bad0e12dbbe941c5aa95fddc6eba9a7da12de23ea69f178f521667b0cdf5c799bc0c40b599d9778570f607d678a823e05ae0dd4954bab1c3f2be19f5dab1b7acc393ffcad4c8e5452f4ad554c3ef7cdc50ddf310f4ae7fae7d42cc0d59a4e6deeb5320bf57d7eb8a17d176c9dd926b053e52e6688f6cf6b3eb723cb617b57e4a3ae8c82fca15bc644c6e20585f8d697cbc627d3e87c8cabc847b42f1552f2f288943f182582eb10b566fb7b26dc5a04ee99fbe0bdc8b04201ce5eb4de11b5c11eb606e2f94cdee73e803c3c51233dca150b7c4b286beba15b8c8f505f0b3462b980f4ca15a50355769dae667fc3800ee1e00574ad7a4efba830a273f782b7ed5f7b582958f973e599036d92308e76deef46c7724916171b80cc34782e1f195920280365005c2971b45ef11c61253ff403139466096635c3840c10e18a50c19fe3f1c469b73589258c33cb6325c1e74cf56045a83ea47e7a5b2c2275025f87ad3dbd0d6de1e4b42c963c1a521a3c9333bf21cb2fa857246f7ac0f1b6f31a42dc9931aac0719afc72e4090f18004d6cf4f7c435a8ebd621ed18dac15039f2e718fb798853578ea5e568d522f4c3a893db7366eb0d11995c632027b3fb0b8a2babe7ff7346c1f16a53eccc8dfd234240ac7397df768b50d2a901253e660005192e7bb6a55eec576d94d418a18a8262236b76aa6b8479561a137987fa6dab1a5f883d59bb24c9f0a2c309ed548c2e73f5a9cb6f167b14ee82fd4043f18fea17bde1c627d6c69ce78300e2b1efb9fe5719810c5dbc45a07b08e4b17f03e97c354b3c8e5c860f71c90749937eca2b958a02f01ac9f4e051bea2930c7382507132d372fa03732167d2c1d824bb0ae961ab0662c01ce0f7d7d35ca94efdb7273277b52ef3842d24cc3fd07c7edb3d58417558478ba6053f0b1cb63c9ec5a96cc31cc8392d36c0e3f4792b74e1c52f0e8f31bfad25dbaa979e3e888cb99596f78e12168290a571e18b9051fde0389450d4313b7f901666fb3d915ca90b0f97ee787b27e35a0019db17e7171670e42ac35fd69ce4f5a28a8edb780235dc8948b7dd7554ab00b5c290066466cf797402204a061e4e21383978ec7a33a39168a2339de435135fd1520fc7f2d6c17e7d8043b228e1d3ed4273fe318788df8c72024fc433bad2010028d1eba4d17e8160e682adfd432c1c93d0338abfc4af7935f1c2ad4d78626b72f34cdac4a33b977a05b2dee810c3b9c176bc387eee41a5583339087b05268ac382e153004411084019194c726bb94288ea368a020354898fbcc7a903153b39500fbd749441436f6a29cf2eaa68bd9a73dfff8872f386a0043b326d17defd6a33488c7b526b1fc8d4e8b0332245d5a35bd51a39b0ffccbdd2ef876a160ed4b03ad6d7963a0340b31a27983ce46f1ea890a804b239d42ff1323464b647ef985e7df6e11c805e6b0bfe7d0c5f7050c811ecc3d42963c887f72c6f0eab75b2064d947ffb6957cd206f1f65c675dd90a9aa3f47de5f9a9cd7e6bce38149cb575d8992a160569e1c5df72efc85b1e79f307d6d85a12705b84a067bce919d0c858186d8b89a242d82cd9ccec11f36a2f643d281ed073b5cc1e47e8909f0ca9cc9d6eb8f8712a3bc7ed1f39511329021fc11844608235d5be4f6900b29964e98aef915c8975bff914c96d254ba5252acf32f052d31607b16284eb6f2ba9a01011d62c10d9446d2494b1741aaee9cde74799e194b2a1f60d8fcba1c80fc1a28e9513959d180a159092d7da7fb2b30fdc35e997bb67ae2f44d76a2065d86ebb4051d9d5568749d7dddadb6f52040c39575f4157309159420a50d1800a1f50c1e75f2e16d83ce4f647b60a9c08b7c4440e6f5421db490bd8cc601d82f070edd419dc1ebaac31b5ec577b10cbb11804257e6b04c0014217cd959d4f8e640e5d9fa06939fe63ffd8c068ed531bf089c1898bc5aa7bac050a51457d014353e015f036bb656142591b5f9111e3f61ffccbb18ac6fb6195e8eb89a2c9b0b43f6e4d6654bf4fe12ac18f4c72ed96656768ed79392c5cb8de6fc221bc440c5cbc416679fca0e5fa2f97a0b251f52bfc8bca4988312c5d72438c9cdc5c08bf07075e4f617e39b04619b2c7e20a4ea04fa369a498d93a293c144080aa45d5eb60c63c2d43313ff97e98b73ee773690e60c302cb4951dc2b7113567fc0f71644dba3053addb74725e48bc9591e68bc4d5ede852292e634b963c429d07ff63471e7baf13e75b4ebaa67df48c26f78f06b5f3579f4ac2b1bc697b53c8cd979aa7a23ef0753789477e0ec9f6f53dfd37c4dff6644c444a4bcea58caa1427efcf15cc5e2f17478e4ac2a83b3abbbafde17740349b04773c941560965c03f14f95e805fc448015877009f949babfe457b6899339407b95be047b716b974d3ff97f79dfe224082be318134ba34680204f9e92dd948de44d0a960ee1e18f00b668e603d048d2ac6f344ce8b066ab4a6d8944927f8582a7751814f51f4b6abe89d9059a7a0f24cce8e13b8db75c59a0079bf0f3300bc7b61480274205c51becef059f8447d8c6cb2db6b37f84c5a67c39465b89a6f8a8cd312154128caa72dcf569e246e156e9037a127f9ca567bde4f6102de1ee", 0x1000, 0xfffffffffffffffd) 16:44:05 executing program 4: accept$packet(0xffffffffffffffff, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001900)=0x14) connect$can_j1939(0xffffffffffffffff, &(0x7f0000001940)={0x1d, r0, 0x1, {0x1, 0x0, 0x2}, 0x2}, 0x18) r1 = getpgrp(0x0) r2 = getpgrp(r1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f00000039c0)={0x2020}, 0x2020) syz_open_procfs$namespace(r2, 0x0) 16:44:06 executing program 3: add_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="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", 0x1000, 0xfffffffffffffffd) 16:44:06 executing program 1: getresuid(0x0, 0x0, 0x0) write$khugepaged_scan(0xffffffffffffffff, &(0x7f0000000000), 0x8) 16:44:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x1, 0x226003) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000100)) getgid() getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x0) getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r6, 0x6b, 0x3, 0x0, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r7, 0x6b, 0x3, 0x0, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000300), &(0x7f0000000340)) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000880)=ANY=[@ANYRESDEC, @ANYRES64=0x0, @ANYBLOB="000000000000000003000000000000000400000000000000020000000000000001000080080000000100000016000000e02b0000000000000300000000000000080000000000000001000900000000000000000000000000010100007f0000008000000000400000ff000000", @ANYRES32=r1, @ANYRES32=r6, @ANYRESHEX=r4, @ANYRES32=r1, @ANYRES32=0xee01, @ANYBLOB="0000000008000000000000000300000000000000400000000000000009000000b30000002f6465762f736723000000000000000006000000000000000100000000000000a3490000000000000000523b01000000001000009b0c000006000000000000000900000000000000000001000000000003000000000000000100000000000000ff0000000000000000010000000000000000000000a0000001000000", @ANYRES32=r3, @ANYBLOB="2f87fe257db438398b1e43f7c60fdfb3ba5fe7fb9ecc05b2730b6404ed95c4f2c70b4665d20ac5df8ce1a2ec8aeb52d10f8309318c22005492450339e88f89ffcc03eb1b0a95c12c1e44a827b8a8", @ANYRES64=r5, @ANYRES32=r1, @ANYRES32=0xee00, @ANYBLOB="36080000ff7f00000000000002000000000000000100000000000000030000000600000040262b0000000000040000000000000001000000000000000900000000000000030000000000000000000100a2080000030000000000000031a3000000000000fcffffffffffffff01000000000000001f0000000000000005000000000000008100000007000000200000000060000014010000", @ANYBLOB="5ab3d150d26f8ec011be4bf7d8f904bad9d0f31af0ef732aa80d83d895b544ee9ca46b4290c14c55271f2e95aa92c2abd28ac8fb4d1d1f40aeff6fd9b19dc617567f4d30238556bcec05865f09106925ce2ac2c37c763a607a14201564ad1a618dcbff257fa8c5816ec7503b3fa53db4cb68a93c995f9a9677add02c96e9060e3c9d20c5a4d5f8b4b89a1dac08ae27f982f8f4f005a3dfbec2e752536986570176086cadab9cbf4b077958a31f66b0a0cbab37f24c4ce8b5cc70", @ANYRES32=0xee00, @ANYBLOB="0000008001000000000000000000000000000000000000000000000009000000060000002f6465762f7367230000000000000000"], 0x338) 16:44:06 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:06 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 16:44:06 executing program 3: add_key(0x0, &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="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", 0x1000, 0xfffffffffffffffd) 16:44:06 executing program 2: r0 = openat$incfs(0xffffffffffffffff, &(0x7f00000007c0)='.log\x00', 0x10100, 0x16) accept4$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000f80)=0x14, 0x80400) r2 = socket$packet(0x11, 0x2, 0x300) accept4$packet(r2, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001000)=0x14, 0x800) accept$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000018c0)=0x14) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x9e, 0x5, 0x401}, 0x8) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000001c40)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001c00)={&(0x7f0000001900)={0x2c4, 0x0, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x20000000}, 0x8008) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:44:06 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) 16:44:06 executing program 1: getresuid(0x0, 0x0, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 16:44:06 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) 16:44:06 executing program 3: add_key(0x0, &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="c39a9e8b4c9e6835c6e069be16c95c458f61433636e3bf1bd905d89d51d5451dd4bb950cf9d2d49b82355c1f9500cf76c739970cac42f7377217ef15abf2ba95f748fc1f91addcd01acaeeac2c20cd301b2a70930c08e13ed9729098b5dc03b004b26e9b843fcf2dff1f291ed9cf236437787ecd667d3a121a9071058d0f1b0dbd64141c122aab28f54abd056eac65c34037ef624165cae59102c8c241484a13cfe589964f71c2b8e56dd171e5b87b787b9830e539e0f737f65dbf45849a4777bd36ae94e0eec5915407c3b1e2c298ca15bd898ddf8c4a5b6474f18941a42b595a07bf854ef4b0abe5ce418d80b49278f95bb0599ecd081298903bf945e36a772c2e58e585606aa668b1ca3c7445dace75d45beaa5f3d73c2839ad159539db1b447acfdea01bd627fd1ca8b2a1d4421e6dcbadbab9dac57884dcbcbe86165e4cefad2bb77c22472723e49f9f437052820485e7593cbfe100549da9b45649c9ddc6babea3c0a64758bb39ecdaabcce197e245e2fc567bc03a580060512e82536c07cefbdcc75ab9038f9d63b5890d82a5aa65ce37a753c88c7ec8b47f9dfcd6dd78b6db18f4b37782c30b5ec92408a21ead90f75d29392d3a7a1ef90221ce975626db38cdf7ae8de084adc132289e13cafcd0aaaf96ca17508d8f3a431fddf4421fa0d81e7f0d7270858314204d07b3405939faf2fccf553e301f470529b43383bad53999ac98cb741b6b666d8eff5ec681a97c9ead1bcf03c119da797b070fdcda768ce89449c531a6c4af52f5b57efb808a0f22d1c095337fedead88fd8e37594c59031dd846bba29d38a5735319f39ab3b2edfd12766492a04f3e6b640f0151da31134f7a5f4a8e1be5bc07eb28f593f0af0f5867fc2215d93d63db0f0e9b5527751dcce2a164270b51ff551fdf91ba59fdba81fbf912c1a7fb30ea843a37aeda78460e58323e3566d75e0a06a2cf208e949e821d5f251f454a313a628b9a6d01b2b7b9df9672d59a33cd2d14532cecea5a89f4b31c1a770f6b24f4244acd12f10edbdd942f20c9a4a95a8f084a0357a0f02198449f304734e455569981a8225e2d04963bf883bac01902dbda42dae1cebba7279a4cfc1d2dbb0ea07d5761bfd303e5c8d73ad230a84cabd3c13d1249a64036b75dea529a5974ef0f7210ed8033f105e16816c7a01c17a6a8d2251dcd1451e2effe597044b64ccd03a9fa8cc680421b3403bcdcefaf541672c900f66e9798db627cee11ce28ed4f1f959ced3d40ee891105da7c03d06467812f20e5781ff320bb794a39a1f2c73a50cb04ae9c8d15757ca67e6b510ba1ff77ffac6a700d500c11fc68478800022cb2a6a48f3adc78c0a8f682ead8ae02e4edf87bf9cebb31782f65d33bf2eb9f56b5524b13a9dca8170f904355045d4ac3b5dc5e95736fd489411a2ce71d54fca32a5c66219eb5528f6cdfbccb60fd1176a5e0bb6c8131c40f98391f90359a504b1fb55fa538a54b8b1210684546f940ed8891ba073eca7dfd427a4c33ab344c7ea9a3056f1c472838279e84f2aacbab79bf8aa616812fd310c2d6bbf9c9949c6a41ec0a60cb10adecac7ca5ab26fb1d25ad098652a75e4a2cece0f3e8fe8d46ebc6e3b6deadc76612200ec0087e191e1caa778544e5ee330b952a69027ad27dfd651f568a31c1130108f224fcc6da983a8d7aceaf524f6b1287f31b011ba04a1d5376f0fe34a1109f866146f6537dcc0a07eb9c387fd9dbc138952898b41611edf3fc93d11143d8fe6ad0da0a3744eaf47694e4057d97973a12f8b314fcff9e3547f003fd6feba5e2d17348524de4a306a9dd1b86a03353d49ccbf4dc00ab3e4bd9218b187e33e97ddf3ebbe53a69678d5f62e24c9f832f404e3e2aef54b21e4501d35edcf83d965b91619b15e8549edb76e3b66d000c78c07cc6cecc279f2102034132d874be24695ccb6a76c9e2a7684484c6fc2f76c7d576e978c2c8e1f9cda3046b4625ab4412f427b334914b392aacf4060074edfe2d700a516a61f2f82d8ebb651578d6e41463abe2091e828926cf8a2d239e83a4030f527269a313a7abd48807852f946aaf1644d00ab06fb6ccd6547d6f95cd8c831c6473151f40bcebaf94c8d9795e52fcd703112c79187da31d24e20be104648477a50a8bfd0e8f4bbf7b337082831d13e081640410aeef0624e45a840acfe7b7ef49bad062500165ad4e5c56632903fcdb1fa6dd7a13902c44452b49d3afbc18e3b27aaed0c9c01cdfaa869c2937aa3ee081833f3c9f75d4115068c23cdcc6d765be48a86ad4f7c927ed055522528bd59039823fc94905d6e2beadb40a38bdcca27c5b90112a2dc72d9439ff917b01e9e5ef3ebfbc19cf825f5d0b9a00a3a8868d405b6e78ddb9d2ddb2631247ad2625bbf50d0c260d6cb7a834d1e6354bf7a6fb2fa5abadbaeccb02d9faf8444c60507fa50da964c04944a56aeaaee379b147900a3dce88075b7da08d231b26fbefac81ec7cf12e2d5d575324e9aeb7bc69f81730058c0ef705e2b273af13dd04156d869c91d16695391cb68e1a95cffd95a516fb927fb45abc428d25e29f351b5f7e2926301e4e2e6a19513986cc204eea3c91f3b86ae39bf18418d8263c8dacae26e9cdbcb1f3bbce36b1c3aff433b071cd2793a6803ecad4cdd4255dd8bde2bf985abe10969d1ddba1964373a588763718a1850582db0784ef086dd71bf7f3b69d0b5e61860988a78d3a1fd0c982c0bb401810ce8371da5ec155be39f3d7970f39f8285643b307b930b6942f631ec06da2ec8ac1349b570f7ff8eb0d469459b5446265a67f9e4513215fd9d61a7f0c11e749e867d68b6e8dec4910a1105a278cb57f534ecf19c1220871b69da80925195fb6e346dee4264adc12c83a52859bd0dda3f949240e881dd56cef973da7710714cff90644f50e310d94be134a2a2a9cabe9e6f642ef6b279296fa85785cb19e6bd29c3b4f5f0b1a09ae1a02f01a833bc14fa3203173613f0ea90ae40740f23115cbe449a9b082f77db1f544327740d4524e9ba7b72f2dd109a23ea9589895aaaee2158e72f6ae7388fff299d6de8c63123858628f967b23d93423b7bacbb40caa4f760d325fc9a58727b0bbfa013cff9bd1ab400b22e7ae6021ce7066d09e7e64f840d0c128bad0e12dbbe941c5aa95fddc6eba9a7da12de23ea69f178f521667b0cdf5c799bc0c40b599d9778570f607d678a823e05ae0dd4954bab1c3f2be19f5dab1b7acc393ffcad4c8e5452f4ad554c3ef7cdc50ddf310f4ae7fae7d42cc0d59a4e6deeb5320bf57d7eb8a17d176c9dd926b053e52e6688f6cf6b3eb723cb617b57e4a3ae8c82fca15bc644c6e20585f8d697cbc627d3e87c8cabc847b42f1552f2f288943f182582eb10b566fb7b26dc5a04ee99fbe0bdc8b04201ce5eb4de11b5c11eb606e2f94cdee73e803c3c51233dca150b7c4b286beba15b8c8f505f0b3462b980f4ca15a50355769dae667fc3800ee1e00574ad7a4efba830a273f782b7ed5f7b582958f973e599036d92308e76deef46c7724916171b80cc34782e1f195920280365005c2971b45ef11c61253ff403139466096635c3840c10e18a50c19fe3f1c469b73589258c33cb6325c1e74cf56045a83ea47e7a5b2c2275025f87ad3dbd0d6de1e4b42c963c1a521a3c9333bf21cb2fa857246f7ac0f1b6f31a42dc9931aac0719afc72e4090f18004d6cf4f7c435a8ebd621ed18dac15039f2e718fb798853578ea5e568d522f4c3a893db7366eb0d11995c632027b3fb0b8a2babe7ff7346c1f16a53eccc8dfd234240ac7397df768b50d2a901253e660005192e7bb6a55eec576d94d418a18a8262236b76aa6b8479561a137987fa6dab1a5f883d59bb24c9f0a2c309ed548c2e73f5a9cb6f167b14ee82fd4043f18fea17bde1c627d6c69ce78300e2b1efb9fe5719810c5dbc45a07b08e4b17f03e97c354b3c8e5c860f71c90749937eca2b958a02f01ac9f4e051bea2930c7382507132d372fa03732167d2c1d824bb0ae961ab0662c01ce0f7d7d35ca94efdb7273277b52ef3842d24cc3fd07c7edb3d58417558478ba6053f0b1cb63c9ec5a96cc31cc8392d36c0e3f4792b74e1c52f0e8f31bfad25dbaa979e3e888cb99596f78e12168290a571e18b9051fde0389450d4313b7f901666fb3d915ca90b0f97ee787b27e35a0019db17e7171670e42ac35fd69ce4f5a28a8edb780235dc8948b7dd7554ab00b5c290066466cf797402204a061e4e21383978ec7a33a39168a2339de435135fd1520fc7f2d6c17e7d8043b228e1d3ed4273fe318788df8c72024fc433bad2010028d1eba4d17e8160e682adfd432c1c93d0338abfc4af7935f1c2ad4d78626b72f34cdac4a33b977a05b2dee810c3b9c176bc387eee41a5583339087b05268ac382e153004411084019194c726bb94288ea368a020354898fbcc7a903153b39500fbd749441436f6a29cf2eaa68bd9a73dfff8872f386a0043b326d17defd6a33488c7b526b1fc8d4e8b0332245d5a35bd51a39b0ffccbdd2ef876a160ed4b03ad6d7963a0340b31a27983ce46f1ea890a804b239d42ff1323464b647ef985e7df6e11c805e6b0bfe7d0c5f7050c811ecc3d42963c887f72c6f0eab75b2064d947ffb6957cd206f1f65c675dd90a9aa3f47de5f9a9cd7e6bce38149cb575d8992a160569e1c5df72efc85b1e79f307d6d85a12705b84a067bce919d0c858186d8b89a242d82cd9ccec11f36a2f643d281ed073b5cc1e47e8909f0ca9cc9d6eb8f8712a3bc7ed1f39511329021fc11844608235d5be4f6900b29964e98aef915c8975bff914c96d254ba5252acf32f052d31607b16284eb6f2ba9a01011d62c10d9446d2494b1741aaee9cde74799e194b2a1f60d8fcba1c80fc1a28e9513959d180a159092d7da7fb2b30fdc35e997bb67ae2f44d76a2065d86ebb4051d9d5568749d7dddadb6f52040c39575f4157309159420a50d1800a1f50c1e75f2e16d83ce4f647b60a9c08b7c4440e6f5421db490bd8cc601d82f070edd419dc1ebaac31b5ec577b10cbb11804257e6b04c0014217cd959d4f8e640e5d9fa06939fe63ffd8c068ed531bf089c1898bc5aa7bac050a51457d014353e015f036bb656142591b5f9111e3f61ffccbb18ac6fb6195e8eb89a2c9b0b43f6e4d6654bf4fe12ac18f4c72ed96656768ed79392c5cb8de6fc221bc440c5cbc416679fca0e5fa2f97a0b251f52bfc8bca4988312c5d72438c9cdc5c08bf07075e4f617e39b04619b2c7e20a4ea04fa369a498d93a293c144080aa45d5eb60c63c2d43313ff97e98b73ee773690e60c302cb4951dc2b7113567fc0f71644dba3053addb74725e48bc9591e68bc4d5ede852292e634b963c429d07ff63471e7baf13e75b4ebaa67df48c26f78f06b5f3579f4ac2b1bc697b53c8cd979aa7a23ef0753789477e0ec9f6f53dfd37c4dff6644c444a4bcea58caa1427efcf15cc5e2f17478e4ac2a83b3abbbafde17740349b04773c941560965c03f14f95e805fc448015877009f949babfe457b6899339407b95be047b716b974d3ff97f79dfe224082be318134ba34680204f9e92dd948de44d0a960ee1e18f00b668e603d048d2ac6f344ce8b066ab4a6d8944927f8582a7751814f51f4b6abe89d9059a7a0f24cce8e13b8db75c59a0079bf0f3300bc7b61480274205c51becef059f8447d8c6cb2db6b37f84c5a67c39465b89a6f8a8cd312154128caa72dcf569e246e156e9037a127f9ca567bde4f6102de1ee", 0x1000, 0xfffffffffffffffd) 16:44:06 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.log\x00', 0x200900, 0x2b) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180)=0x8, 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x22000, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x5) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xc280, 0x20) faccessat2(r3, &(0x7f0000000200)='./file0\x00', 0x50, 0x1100) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') r4 = openat$incfs(r2, &(0x7f0000000a80)='.log\x00', 0x208180, 0x40) accept$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001d00)=0x14) connect$can_j1939(r4, &(0x7f0000001d40)={0x1d, r5, 0x3, {0x3, 0x0, 0x4}, 0xff}, 0x18) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r6, 0x6b, 0x3, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xc, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000feffffff00006a5926da5b6e180ade8d941a0000e76a0000a07902006e3ca9be6ecb04ad95b8a67bc3a8e696666bfd7a4122179a8a268f0541e0bb199e1bd0ac2970e0d10af10edb499aca24f347daf43e1318486d2a793a4c33bf76752a4b683d53ab5fd421c649b685a0b3047ac8c822432e6654ef9e50e510e6ca99a59f46ebf479d006037267d5e96ecee9d04601b2adde74ae798277ee523b746a91e129fa3604dbab8d4f731e469a594f228f2f1a26ce9aeb5c7a"], &(0x7f0000000240)='GPL\x00', 0x6, 0xdb, &(0x7f0000000280)=""/219, 0x41000, 0x0, '\x00', 0x0, 0x1f, r0, 0x8, &(0x7f0000000380)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x9, 0x2, 0x7}, 0x10}, 0x78) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000480)={0x8}) 16:44:07 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x4}) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:44:07 executing program 4: syz_open_procfs$namespace(0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_FLOW={0x6, 0x6, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x401c850) 16:44:07 executing program 1: connect$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x1a, 0x0, 0x1, 0x1}, 0x14) getresuid(0x0, 0x0, 0x0) 16:44:07 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x30fb000000, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:07 executing program 3: add_key(0x0, &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="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", 0x1000, 0xfffffffffffffffd) 16:44:07 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000002a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002ac0)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000002b00)={0x18, 0x1, 0x2000000, 0x1f, 0x401, r0, 0x800, '\x00', r1, 0xffffffffffffffff, 0x2, 0x3}, 0x40) 16:44:07 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "7abdf98468870ecbe940bcc112f862783c7430d8ad903e8d1e485577225830b42ef2aa89535870abf734d6d41eba7b541588fa4393061deb77da5f0675ac1456"}, 0x48, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) keyctl$search(0xa, r0, &(0x7f0000000000)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, 0xffffffffffffffff) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000100)) getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) 16:44:07 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) epoll_wait(0xffffffffffffffff, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) 16:44:07 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r0, 0x200, 0x70bd27, 0x3, {}, [@HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0x11) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x114, r0, 0x400, 0x1, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x3}, 0x40000080) syz_open_procfs$namespace(0x0, 0x0) 16:44:07 executing program 3: add_key(&(0x7f0000000040)='.request_key_auth\x00', 0x0, &(0x7f00000000c0)="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", 0x1000, 0xfffffffffffffffd) 16:44:07 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000080), 0x0) 16:44:07 executing program 1: accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x80c00) getresuid(0x0, 0x0, 0x0) 16:44:07 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0xe00, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:07 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1ad, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:07 executing program 3: add_key(&(0x7f0000000040)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 16:44:08 executing program 1: getresuid(0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) syz_usb_ep_write(0xffffffffffffffff, 0x5, 0x80, &(0x7f0000000000)="9108415d29a308bd09b044ee9727757224e88874f98f4b3993aadebb8139a65d9da7e86652e741fceed8642e8d41bd0cb4f920800c09ff3003ec8afe437fc7ec57dac331640e43859b43989e5528ac3f436be9b91edc0d5641633e501781c45d7319442f355140da4891b7de88198bdbebff3ce34aa74304f3ec601b197dacef") 16:44:08 executing program 2: getresuid(&(0x7f0000000080), &(0x7f0000000040), 0x0) getuid() 16:44:08 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:08 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = socket(0x15, 0x6, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x209, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44080}, 0x20008000) [ 583.639401][ T1576] INFO: task kworker/0:5:9509 blocked for more than 143 seconds. [ 583.649219][ T1576] Not tainted 5.13.0-rc4-syzkaller #0 [ 583.649255][ T1576] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 583.649266][ T1576] task:kworker/0:5 state:D stack:26576 pid: 9509 ppid: 2 flags:0x00004000 [ 583.649311][ T1576] Workqueue: pm hcd_resume_work [ 583.678419][ T1576] Call Trace: [ 583.683208][ T1576] __schedule+0x916/0x23e0 [ 583.687692][ T1576] ? io_schedule_timeout+0x140/0x140 [ 583.695947][ T1576] ? _raw_spin_unlock_irq+0x1f/0x40 [ 583.702431][ T1576] ? lockdep_hardirqs_on+0x79/0x100 [ 583.717781][ T1576] schedule+0xcf/0x270 [ 583.726602][ T1576] schedule_preempt_disabled+0xf/0x20 [ 583.744193][ T1576] __mutex_lock+0x7d4/0x10c0 [ 583.748866][ T1576] ? usb_remote_wakeup+0x1f/0xe0 [ 583.763441][ T1576] ? mutex_lock_io_nested+0xf20/0xf20 [ 583.768889][ T1576] ? do_raw_spin_lock+0x120/0x2b0 [ 583.778215][ T1576] usb_remote_wakeup+0x1f/0xe0 16:44:08 executing program 5: getresuid(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200002, 0x8) getuid() r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000280)=0x6) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) epoll_wait(0xffffffffffffffff, &(0x7f00000002c0)=[{}, {}], 0x2, 0x7) 16:44:08 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r0, 0x200, 0x70bd27, 0x3, {}, [@HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0x11) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x114, r0, 0x400, 0x1, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x3}, 0x40000080) syz_open_procfs$namespace(0x0, 0x0) 16:44:08 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), 0x0) getuid() 16:44:08 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:08 executing program 4: syz_open_procfs$namespace(0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000000)=0x2, 0x4) 16:44:08 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xd7b, 0x82, 0x1f, 0x7}, {0x4, 0x1, 0x1f, 0x7}]}, 0x10) getresuid(0x0, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffff7}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_SOCK={0x48, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x38}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x60000000}]}, @TIPC_NLA_SOCK_CON={0x4}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x1}, 0x4808c) [ 583.792190][ T1576] process_one_work+0x98d/0x1600 [ 583.797522][ T1576] ? pwq_dec_nr_in_flight+0x320/0x320 [ 583.819674][ T1576] ? try_to_del_timer_sync+0xbf/0x110 [ 583.830936][ T1576] worker_thread+0x64c/0x1120 [ 583.835704][ T1576] ? process_one_work+0x1600/0x1600 [ 583.876575][ T1576] kthread+0x3b1/0x4a0 [ 583.904377][ T1576] ? __kthread_bind_mask+0xc0/0xc0 [ 583.939839][ T1576] ret_from_fork+0x1f/0x30 16:44:08 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 16:44:08 executing program 4: syz_open_procfs$namespace(0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) 16:44:08 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000000), 0x0) 16:44:08 executing program 3: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x80, 0x46}, &(0x7f0000000040)={0xffff, 0x7, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffa, 0x101}, &(0x7f0000000080)={0x9, 0x20, 0xffffffffffffffff, 0x2, 0x293, 0x7, 0xfffffffffffff2dd, 0x5f60}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) [ 583.971283][ T1576] [ 583.971283][ T1576] Showing all locks held in the system: 16:44:09 executing program 1: getresuid(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r2 = getgid() r3 = getgid() r4 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000003e00)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = getgid() write$FUSE_DIRENTPLUS(r0, &(0x7f0000005e40)={0x3d0, 0x0, 0x0, [{{0x1, 0x2, 0x2, 0x93, 0x150, 0x5, {0x5, 0x100000000, 0x7ff, 0xd2, 0x10001, 0xfff, 0x3ff, 0xe7, 0x85, 0x1000, 0x9, r1, r2, 0x9, 0x7fffffff}}, {0x0, 0x7, 0x1, 0x8a, '('}}, {{0x0, 0x2, 0x7, 0x8001, 0x608429b9, 0x9, {0x0, 0x3, 0x7fffffff, 0xe6be, 0x4, 0x0, 0x6, 0x185, 0x1ff, 0x6000, 0x9, 0xffffffffffffffff, r3, 0x7fffffff, 0x401}}, {0x1, 0x7, 0x5, 0x6, '/]/!,'}}, {{0x2, 0x0, 0x1a878377, 0x6, 0x4, 0x401, {0x6, 0x9, 0xfff, 0x6b, 0x6, 0x0, 0x1f, 0x1ff, 0x3, 0x2000, 0x81, r4, 0xee00, 0x7, 0x2}}, {0x1, 0x10000, 0x5, 0xcc1000, '(+^\xee('}}, {{0x1, 0x1, 0x1, 0x7, 0xe6, 0x7fffffff, {0x6, 0x17e4, 0x64, 0x40, 0xfffffffffffff0db, 0x796, 0x1ff, 0x20, 0x3, 0x4000, 0x25, 0xffffffffffffffff, 0xffffffffffffffff, 0x9, 0x40}}, {0x1, 0xd6d3, 0x1, 0x9, '\\'}}, {{0x1, 0x3, 0x800, 0xcba, 0xba4, 0x0, {0x5, 0x0, 0xffffffffffffff81, 0x100000000, 0x936, 0x404000000000, 0x6, 0xfffeffff, 0xa19, 0x2000, 0xffffffff, r5, r6, 0x7fffffff, 0x2}}, {0x4, 0x3ff, 0x8, 0x20, '{).&.!{#'}}, {{0x6, 0x1, 0x101, 0x1ff, 0x8000, 0x1f, {0x5, 0x3ff, 0x5, 0x7f, 0x9, 0x4, 0x4, 0x8, 0x400, 0x6000, 0x9, 0xee00, 0xffffffffffffffff, 0xce, 0xe0f}}, {0x4, 0x1, 0x7, 0x1, '$}\xda&-t&'}}]}, 0x3d0) recvmsg$can_j1939(r0, &(0x7f0000002200)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002140)=[{&(0x7f00000020c0)=""/95, 0x5f}], 0x1, &(0x7f0000002180)=""/93, 0x5d}, 0x80000040) setsockopt$packet_drop_memb(r7, 0x107, 0x2, &(0x7f0000002240)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x36}}, 0x10) [ 584.030321][ T1576] 5 locks held by kworker/0:2/8: [ 584.035323][ T1576] #0: ffff888019834938 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x871/0x1600 16:44:09 executing program 4: r0 = getpgrp(0x0) getpgrp(r0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000007140), 0x0, 0x0) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000000)={0x2020}, 0x202a) syz_open_procfs$namespace(r0, 0x0) [ 584.108771][ T1576] #1: ffffc90000cd7da8 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x8a5/0x1600 [ 584.200872][ T1576] #2: ffff888021817220 (&dev->mutex){....}-{3:3}, at: hub_event+0x1c1/0x4330 [ 584.233643][ T1576] #3: ffff88802184a578 (&port_dev->status_lock){+.+.}-{3:3}, at: hub_event+0x2178/0x4330 [ 584.269129][ T1576] #4: ffff88802101d068 (hcd->address0_mutex){+.+.}-{3:3}, at: hub_port_init+0x1b5/0x2db0 [ 584.303875][ T1576] 1 lock held by khungtaskd/1576: [ 584.317510][ T1576] #0: ffffffff8bf79320 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 584.336583][ T1576] 1 lock held by systemd-udevd/4858: [ 584.342085][ T1576] 5 locks held by kworker/1:3/4872: [ 584.347338][ T1576] #0: ffff888019834938 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x871/0x1600 [ 584.387652][ T1576] #1: ffffc9000164fda8 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x8a5/0x1600 [ 584.416579][ T1576] #2: ffff888146a07220 (&dev->mutex){....}-{3:3}, at: hub_event+0x1c1/0x4330 [ 584.428697][ T1576] #3: ffff888021a52578 (&port_dev->status_lock){+.+.}-{3:3}, at: hub_event+0x2178/0x4330 [ 584.448991][ T1576] #4: ffff888146913868 (hcd->address0_mutex){+.+.}-{3:3}, at: hub_port_init+0x1b5/0x2db0 [ 584.469039][ T1576] 1 lock held by in:imklog/8147: [ 584.474214][ T1576] #0: ffff888014be2d70 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 584.489264][ T1576] 3 locks held by kworker/0:5/9509: [ 584.494493][ T1576] #0: ffff888012397538 ((wq_completion)pm){+.+.}-{0:0}, at: process_one_work+0x871/0x1600 [ 584.505715][ T1576] #1: ffffc90006387da8 ((work_completion)(&hcd->wakeup_work)){+.+.}-{0:0}, at: process_one_work+0x8a5/0x1600 [ 584.518116][ T1576] #2: ffff888146a07220 (&dev->mutex){....}-{3:3}, at: usb_remote_wakeup+0x1f/0xe0 [ 584.540641][ T1576] 2 locks held by kworker/1:2/29959: [ 584.546199][ T1576] #0: ffff8880b9d35658 (&rq->lock){-.-.}-{2:2}, at: __schedule+0x21c/0x23e0 [ 584.579105][ T1576] #1: ffff8880b9d1f988 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x24c/0x670 [ 584.609015][ T1576] 2 locks held by systemd-udevd/4270: [ 584.614624][ T1576] [ 584.616975][ T1576] ============================================= [ 584.616975][ T1576] [ 584.628634][ T1576] NMI backtrace for cpu 0 [ 584.633499][ T1576] CPU: 0 PID: 1576 Comm: khungtaskd Not tainted 5.13.0-rc4-syzkaller #0 [ 584.641886][ T1576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.651968][ T1576] Call Trace: [ 584.655275][ T1576] dump_stack+0x141/0x1d7 [ 584.659643][ T1576] nmi_cpu_backtrace.cold+0x44/0xd7 [ 584.664962][ T1576] ? lapic_can_unplug_cpu+0x80/0x80 [ 584.670233][ T1576] nmi_trigger_cpumask_backtrace+0x1b3/0x230 [ 584.676685][ T1576] watchdog+0xd48/0xfb0 [ 584.681163][ T1576] ? reset_hung_task_detector+0x30/0x30 [ 584.686744][ T1576] kthread+0x3b1/0x4a0 [ 584.690841][ T1576] ? __kthread_bind_mask+0xc0/0xc0 [ 584.695985][ T1576] ret_from_fork+0x1f/0x30 [ 584.700954][ T1576] Sending NMI from CPU 0 to CPUs 1: [ 584.706831][ C1] NMI backtrace for cpu 1 [ 584.706842][ C1] CPU: 1 PID: 4858 Comm: systemd-udevd Not tainted 5.13.0-rc4-syzkaller #0 [ 584.706851][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.706860][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 [ 584.706870][ C1] Code: 81 e1 00 01 00 00 65 48 8b 14 25 00 f0 01 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 3c 15 00 00 85 c0 74 2b 8b 82 18 15 00 00 <83> f8 02 75 20 48 8b 8a 20 15 00 00 8b 92 1c 15 00 00 48 8b 01 48 [ 584.706884][ C1] RSP: 0018:ffffc9000111f860 EFLAGS: 00000246 [ 584.706896][ C1] RAX: 0000000000000000 RBX: 000000000000000c RCX: 0000000000000000 [ 584.706904][ C1] RDX: ffff888012df0000 RSI: ffffffff83987bf1 RDI: 0000000000000003 [ 584.706912][ C1] RBP: ffff88802191e800 R08: 0000000000000000 R09: 000000000000000c [ 584.706920][ C1] R10: ffffffff83987c2a R11: 0000000000000010 R12: 0000000000000020 [ 584.706928][ C1] R13: 0000000000000327 R14: dffffc0000000000 R15: 0000000000000000 [ 584.706936][ C1] FS: 00007fafd39498c0(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 584.706944][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 584.706951][ C1] CR2: 000055e0eeaa1dd8 CR3: 0000000018b11000 CR4: 00000000001506e0 [ 584.706959][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 584.706966][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 584.706973][ C1] Call Trace: [ 584.706978][ C1] tomoyo_domain_quota_is_ok+0x2f1/0x550 [ 584.706984][ C1] tomoyo_supervisor+0x2f2/0xf00 [ 584.706989][ C1] ? tomoyo_profile+0x50/0x50 [ 584.706994][ C1] ? kasan_quarantine_put+0xf5/0x210 [ 584.707000][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 584.707006][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 584.707012][ C1] ? tomoyo_path_matches_pattern+0x110/0x280 [ 584.707019][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 584.707025][ C1] ? tomoyo_check_path_acl+0xab/0x210 [ 584.707031][ C1] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 584.707037][ C1] ? tomoyo_same_mount_acl+0x450/0x450 [ 584.707043][ C1] tomoyo_path_permission+0x270/0x3a0 [ 584.707048][ C1] tomoyo_path_perm+0x2f0/0x400 [ 584.707054][ C1] ? tomoyo_check_open_permission+0x380/0x380 [ 584.707060][ C1] ? may_linkat+0x2d0/0x2d0 [ 584.707065][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 584.707072][ C1] ? getname_flags.part.0+0x1dd/0x4f0 [ 584.707077][ C1] security_inode_getattr+0xcf/0x140 [ 584.707083][ C1] vfs_statx+0x164/0x390 [ 584.707088][ C1] ? do_readlinkat+0x2f0/0x2f0 [ 584.707093][ C1] __do_sys_newlstat+0x91/0x110 [ 584.707098][ C1] ? __do_sys_lstat+0x110/0x110 [ 584.707104][ C1] ? __context_tracking_exit+0xb8/0xe0 [ 584.707110][ C1] ? __secure_computing+0x104/0x360 [ 584.707115][ C1] ? syscall_trace_enter.constprop.0+0x94/0x260 [ 584.707121][ C1] do_syscall_64+0x3a/0xb0 [ 584.707127][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 584.707132][ C1] RIP: 0033:0x7fafd27bb335 [ 584.707141][ C1] Code: 69 db 2b 00 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 83 ff 01 48 89 f0 77 30 48 89 c7 48 89 d6 b8 06 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 03 f3 c3 90 48 8b 15 31 db 2b 00 f7 d8 64 89 [ 584.707156][ C1] RSP: 002b:00007ffca19659a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000006 [ 584.707168][ C1] RAX: ffffffffffffffda RBX: 000055e0eea866b0 RCX: 00007fafd27bb335 [ 584.707176][ C1] RDX: 00007ffca19659e0 RSI: 00007ffca19659e0 RDI: 000055e0eea856b0 [ 584.707183][ C1] RBP: 00007ffca1965aa0 R08: 00007fafd2a7a228 R09: 0000000000001010 [ 584.707191][ C1] R10: 00007fafd2a79b58 R11: 0000000000000246 R12: 000055e0eea856b0 [ 584.707199][ C1] R13: 000055e0eea856d0 R14: 000055e0eea6320b R15: 000055e0eea63210 [ 585.104246][ T1576] Kernel panic - not syncing: hung_task: blocked tasks [ 585.111234][ T1576] CPU: 1 PID: 1576 Comm: khungtaskd Not tainted 5.13.0-rc4-syzkaller #0 [ 585.119670][ T1576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.130177][ T1576] Call Trace: [ 585.133473][ T1576] dump_stack+0x141/0x1d7 [ 585.137921][ T1576] panic+0x306/0x73d [ 585.141853][ T1576] ? __warn_printk+0xf3/0xf3 [ 585.146920][ T1576] ? lapic_can_unplug_cpu+0x80/0x80 [ 585.152147][ T1576] ? preempt_schedule_thunk+0x16/0x18 [ 585.157595][ T1576] ? nmi_trigger_cpumask_backtrace+0x196/0x230 [ 585.163783][ T1576] ? watchdog.cold+0x5/0x158 [ 585.168446][ T1576] watchdog.cold+0x16/0x158 [ 585.173087][ T1576] ? reset_hung_task_detector+0x30/0x30 [ 585.178671][ T1576] kthread+0x3b1/0x4a0 [ 585.182869][ T1576] ? __kthread_bind_mask+0xc0/0xc0 [ 585.188015][ T1576] ret_from_fork+0x1f/0x30 [ 585.192702][ T1576] Kernel Offset: disabled [ 585.197149][ T1576] Rebooting in 86400 seconds..